Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-61729 (GCVE-0-2025-61729)
Vulnerability from cvelistv5 – Published: 2025-12-02 18:54 – Updated: 2025-12-03 19:37
VLAI?
EPSS
Title
Excessive resource consumption when printing error string for host certificate validation in crypto/x509
Summary
Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.
Severity ?
7.5 (High)
CWE
- CWE-400 - Uncontrolled Resource Consumption
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Go standard library | crypto/x509 |
Affected:
0 , < 1.24.11
(semver)
Affected: 1.25.0 , < 1.25.5 (semver) |
Credits
Philippe Antoine (Catena cyber)
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-61729",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-02T21:52:36.341575Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-02T21:52:58.224Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://pkg.go.dev",
"defaultStatus": "unaffected",
"packageName": "crypto/x509",
"product": "crypto/x509",
"programRoutines": [
{
"name": "Certificate.VerifyHostname"
},
{
"name": "Certificate.Verify"
}
],
"vendor": "Go standard library",
"versions": [
{
"lessThan": "1.24.11",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"lessThan": "1.25.5",
"status": "affected",
"version": "1.25.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Philippe Antoine (Catena cyber)"
}
],
"descriptions": [
{
"lang": "en",
"value": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-400: Uncontrolled Resource Consumption",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-03T19:37:14.903Z",
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"shortName": "Go"
},
"references": [
{
"url": "https://go.dev/cl/725920"
},
{
"url": "https://go.dev/issue/76445"
},
{
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"title": "Excessive resource consumption when printing error string for host certificate validation in crypto/x509"
}
},
"cveMetadata": {
"assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"assignerShortName": "Go",
"cveId": "CVE-2025-61729",
"datePublished": "2025-12-02T18:54:10.166Z",
"dateReserved": "2025-09-30T15:05:03.605Z",
"dateUpdated": "2025-12-03T19:37:14.903Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-61729\",\"sourceIdentifier\":\"security@golang.org\",\"published\":\"2025-12-02T19:15:51.447\",\"lastModified\":\"2025-12-19T18:25:28.283\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.24.11\",\"matchCriteriaId\":\"F2E6FD2A-A487-4099-B91D-2429F286AC6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.25.0\",\"versionEndExcluding\":\"1.25.5\",\"matchCriteriaId\":\"39C03A37-B94B-46E4-B1C2-A70A870F8E53\"}]}]}],\"references\":[{\"url\":\"https://go.dev/cl/725920\",\"source\":\"security@golang.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://go.dev/issue/76445\",\"source\":\"security@golang.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/8FJoBkPddm4\",\"source\":\"security@golang.org\",\"tags\":[\"Mailing List\",\"Release Notes\"]},{\"url\":\"https://pkg.go.dev/vuln/GO-2025-4155\",\"source\":\"security@golang.org\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-61729\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-12-02T21:52:36.341575Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-12-02T21:52:53.822Z\"}}], \"cna\": {\"title\": \"Excessive resource consumption when printing error string for host certificate validation in crypto/x509\", \"credits\": [{\"lang\": \"en\", \"value\": \"Philippe Antoine (Catena cyber)\"}], \"affected\": [{\"vendor\": \"Go standard library\", \"product\": \"crypto/x509\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.24.11\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"1.25.0\", \"lessThan\": \"1.25.5\", \"versionType\": \"semver\"}], \"packageName\": \"crypto/x509\", \"collectionURL\": \"https://pkg.go.dev\", \"defaultStatus\": \"unaffected\", \"programRoutines\": [{\"name\": \"Certificate.VerifyHostname\"}, {\"name\": \"Certificate.Verify\"}]}], \"references\": [{\"url\": \"https://go.dev/cl/725920\"}, {\"url\": \"https://go.dev/issue/76445\"}, {\"url\": \"https://groups.google.com/g/golang-announce/c/8FJoBkPddm4\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2025-4155\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-400: Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"shortName\": \"Go\", \"dateUpdated\": \"2025-12-03T19:37:14.903Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-61729\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-12-03T19:37:14.903Z\", \"dateReserved\": \"2025-09-30T15:05:03.605Z\", \"assignerOrgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"datePublished\": \"2025-12-02T18:54:10.166Z\", \"assignerShortName\": \"Go\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
OPENSUSE-SU-2025:15796-1
Vulnerability from csaf_opensuse - Published: 2025-12-04 00:00 - Updated: 2025-12-04 00:00Summary
go1.24-1.24.11-1.1 on GA media
Notes
Title of the patch
go1.24-1.24.11-1.1 on GA media
Description of the patch
These are all security issues fixed in the go1.24-1.24.11-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15796
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "go1.24-1.24.11-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the go1.24-1.24.11-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15796",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15796-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "go1.24-1.24.11-1.1 on GA media",
"tracking": {
"current_release_date": "2025-12-04T00:00:00Z",
"generator": {
"date": "2025-12-04T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15796-1",
"initial_release_date": "2025-12-04T00:00:00Z",
"revision_history": [
{
"date": "2025-12-04T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-1.1.aarch64",
"product": {
"name": "go1.24-1.24.11-1.1.aarch64",
"product_id": "go1.24-1.24.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-1.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.11-1.1.aarch64",
"product_id": "go1.24-doc-1.24.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.11-1.1.aarch64",
"product": {
"name": "go1.24-libstd-1.24.11-1.1.aarch64",
"product_id": "go1.24-libstd-1.24.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-1.1.aarch64",
"product": {
"name": "go1.24-race-1.24.11-1.1.aarch64",
"product_id": "go1.24-race-1.24.11-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-1.1.ppc64le",
"product": {
"name": "go1.24-1.24.11-1.1.ppc64le",
"product_id": "go1.24-1.24.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-1.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.11-1.1.ppc64le",
"product_id": "go1.24-doc-1.24.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.11-1.1.ppc64le",
"product": {
"name": "go1.24-libstd-1.24.11-1.1.ppc64le",
"product_id": "go1.24-libstd-1.24.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-1.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.11-1.1.ppc64le",
"product_id": "go1.24-race-1.24.11-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-1.1.s390x",
"product": {
"name": "go1.24-1.24.11-1.1.s390x",
"product_id": "go1.24-1.24.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-1.1.s390x",
"product": {
"name": "go1.24-doc-1.24.11-1.1.s390x",
"product_id": "go1.24-doc-1.24.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.11-1.1.s390x",
"product": {
"name": "go1.24-libstd-1.24.11-1.1.s390x",
"product_id": "go1.24-libstd-1.24.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-1.1.s390x",
"product": {
"name": "go1.24-race-1.24.11-1.1.s390x",
"product_id": "go1.24-race-1.24.11-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-1.1.x86_64",
"product": {
"name": "go1.24-1.24.11-1.1.x86_64",
"product_id": "go1.24-1.24.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-1.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.11-1.1.x86_64",
"product_id": "go1.24-doc-1.24.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.11-1.1.x86_64",
"product": {
"name": "go1.24-libstd-1.24.11-1.1.x86_64",
"product_id": "go1.24-libstd-1.24.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-1.1.x86_64",
"product": {
"name": "go1.24-race-1.24.11-1.1.x86_64",
"product_id": "go1.24-race-1.24.11-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-1.24.11-1.1.aarch64"
},
"product_reference": "go1.24-1.24.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-1.24.11-1.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-1.24.11-1.1.s390x"
},
"product_reference": "go1.24-1.24.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-1.24.11-1.1.x86_64"
},
"product_reference": "go1.24-1.24.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.ppc64le"
},
"product_reference": "go1.24-libstd-1.24.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.s390x"
},
"product_reference": "go1.24-libstd-1.24.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.s390x"
},
"product_reference": "go1.24-race-1.24.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-04T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.11-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-04T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
OPENSUSE-SU-2025:15795-1
Vulnerability from csaf_opensuse - Published: 2025-12-03 00:00 - Updated: 2025-12-03 00:00Summary
go1.25-1.25.5-1.1 on GA media
Notes
Title of the patch
go1.25-1.25.5-1.1 on GA media
Description of the patch
These are all security issues fixed in the go1.25-1.25.5-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15795
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "go1.25-1.25.5-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the go1.25-1.25.5-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15795",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15795-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "go1.25-1.25.5-1.1 on GA media",
"tracking": {
"current_release_date": "2025-12-03T00:00:00Z",
"generator": {
"date": "2025-12-03T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15795-1",
"initial_release_date": "2025-12-03T00:00:00Z",
"revision_history": [
{
"date": "2025-12-03T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-1.1.aarch64",
"product": {
"name": "go1.25-1.25.5-1.1.aarch64",
"product_id": "go1.25-1.25.5-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-1.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.5-1.1.aarch64",
"product_id": "go1.25-doc-1.25.5-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.5-1.1.aarch64",
"product": {
"name": "go1.25-libstd-1.25.5-1.1.aarch64",
"product_id": "go1.25-libstd-1.25.5-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-1.1.aarch64",
"product": {
"name": "go1.25-race-1.25.5-1.1.aarch64",
"product_id": "go1.25-race-1.25.5-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-1.1.ppc64le",
"product": {
"name": "go1.25-1.25.5-1.1.ppc64le",
"product_id": "go1.25-1.25.5-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-1.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.5-1.1.ppc64le",
"product_id": "go1.25-doc-1.25.5-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.5-1.1.ppc64le",
"product": {
"name": "go1.25-libstd-1.25.5-1.1.ppc64le",
"product_id": "go1.25-libstd-1.25.5-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-1.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.5-1.1.ppc64le",
"product_id": "go1.25-race-1.25.5-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-1.1.s390x",
"product": {
"name": "go1.25-1.25.5-1.1.s390x",
"product_id": "go1.25-1.25.5-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-1.1.s390x",
"product": {
"name": "go1.25-doc-1.25.5-1.1.s390x",
"product_id": "go1.25-doc-1.25.5-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.5-1.1.s390x",
"product": {
"name": "go1.25-libstd-1.25.5-1.1.s390x",
"product_id": "go1.25-libstd-1.25.5-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-1.1.s390x",
"product": {
"name": "go1.25-race-1.25.5-1.1.s390x",
"product_id": "go1.25-race-1.25.5-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-1.1.x86_64",
"product": {
"name": "go1.25-1.25.5-1.1.x86_64",
"product_id": "go1.25-1.25.5-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-1.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.5-1.1.x86_64",
"product_id": "go1.25-doc-1.25.5-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.5-1.1.x86_64",
"product": {
"name": "go1.25-libstd-1.25.5-1.1.x86_64",
"product_id": "go1.25-libstd-1.25.5-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-1.1.x86_64",
"product": {
"name": "go1.25-race-1.25.5-1.1.x86_64",
"product_id": "go1.25-race-1.25.5-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.5-1.1.aarch64"
},
"product_reference": "go1.25-1.25.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.5-1.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.5-1.1.s390x"
},
"product_reference": "go1.25-1.25.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.5-1.1.x86_64"
},
"product_reference": "go1.25-1.25.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.ppc64le"
},
"product_reference": "go1.25-libstd-1.25.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.s390x"
},
"product_reference": "go1.25-libstd-1.25.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.s390x"
},
"product_reference": "go1.25-race-1.25.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-03T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.5-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-03T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
OPENSUSE-SU-2026:10030-1
Vulnerability from csaf_opensuse - Published: 2026-01-12 00:00 - Updated: 2026-01-12 00:00Summary
k6-1.5.0-1.1 on GA media
Notes
Title of the patch
k6-1.5.0-1.1 on GA media
Description of the patch
These are all security issues fixed in the k6-1.5.0-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2026-10030
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "k6-1.5.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the k6-1.5.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10030",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10030-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "k6-1.5.0-1.1 on GA media",
"tracking": {
"current_release_date": "2026-01-12T00:00:00Z",
"generator": {
"date": "2026-01-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10030-1",
"initial_release_date": "2026-01-12T00:00:00Z",
"revision_history": [
{
"date": "2026-01-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "k6-1.5.0-1.1.aarch64",
"product": {
"name": "k6-1.5.0-1.1.aarch64",
"product_id": "k6-1.5.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "k6-bash-completion-1.5.0-1.1.aarch64",
"product": {
"name": "k6-bash-completion-1.5.0-1.1.aarch64",
"product_id": "k6-bash-completion-1.5.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "k6-fish-completion-1.5.0-1.1.aarch64",
"product": {
"name": "k6-fish-completion-1.5.0-1.1.aarch64",
"product_id": "k6-fish-completion-1.5.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "k6-zsh-completion-1.5.0-1.1.aarch64",
"product": {
"name": "k6-zsh-completion-1.5.0-1.1.aarch64",
"product_id": "k6-zsh-completion-1.5.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "k6-1.5.0-1.1.ppc64le",
"product": {
"name": "k6-1.5.0-1.1.ppc64le",
"product_id": "k6-1.5.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "k6-bash-completion-1.5.0-1.1.ppc64le",
"product": {
"name": "k6-bash-completion-1.5.0-1.1.ppc64le",
"product_id": "k6-bash-completion-1.5.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "k6-fish-completion-1.5.0-1.1.ppc64le",
"product": {
"name": "k6-fish-completion-1.5.0-1.1.ppc64le",
"product_id": "k6-fish-completion-1.5.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "k6-zsh-completion-1.5.0-1.1.ppc64le",
"product": {
"name": "k6-zsh-completion-1.5.0-1.1.ppc64le",
"product_id": "k6-zsh-completion-1.5.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "k6-1.5.0-1.1.s390x",
"product": {
"name": "k6-1.5.0-1.1.s390x",
"product_id": "k6-1.5.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "k6-bash-completion-1.5.0-1.1.s390x",
"product": {
"name": "k6-bash-completion-1.5.0-1.1.s390x",
"product_id": "k6-bash-completion-1.5.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "k6-fish-completion-1.5.0-1.1.s390x",
"product": {
"name": "k6-fish-completion-1.5.0-1.1.s390x",
"product_id": "k6-fish-completion-1.5.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "k6-zsh-completion-1.5.0-1.1.s390x",
"product": {
"name": "k6-zsh-completion-1.5.0-1.1.s390x",
"product_id": "k6-zsh-completion-1.5.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "k6-1.5.0-1.1.x86_64",
"product": {
"name": "k6-1.5.0-1.1.x86_64",
"product_id": "k6-1.5.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "k6-bash-completion-1.5.0-1.1.x86_64",
"product": {
"name": "k6-bash-completion-1.5.0-1.1.x86_64",
"product_id": "k6-bash-completion-1.5.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "k6-fish-completion-1.5.0-1.1.x86_64",
"product": {
"name": "k6-fish-completion-1.5.0-1.1.x86_64",
"product_id": "k6-fish-completion-1.5.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "k6-zsh-completion-1.5.0-1.1.x86_64",
"product": {
"name": "k6-zsh-completion-1.5.0-1.1.x86_64",
"product_id": "k6-zsh-completion-1.5.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-1.5.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-1.5.0-1.1.aarch64"
},
"product_reference": "k6-1.5.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-1.5.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-1.5.0-1.1.ppc64le"
},
"product_reference": "k6-1.5.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-1.5.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-1.5.0-1.1.s390x"
},
"product_reference": "k6-1.5.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-1.5.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-1.5.0-1.1.x86_64"
},
"product_reference": "k6-1.5.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-bash-completion-1.5.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.aarch64"
},
"product_reference": "k6-bash-completion-1.5.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-bash-completion-1.5.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.ppc64le"
},
"product_reference": "k6-bash-completion-1.5.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-bash-completion-1.5.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.s390x"
},
"product_reference": "k6-bash-completion-1.5.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-bash-completion-1.5.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.x86_64"
},
"product_reference": "k6-bash-completion-1.5.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-fish-completion-1.5.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.aarch64"
},
"product_reference": "k6-fish-completion-1.5.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-fish-completion-1.5.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.ppc64le"
},
"product_reference": "k6-fish-completion-1.5.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-fish-completion-1.5.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.s390x"
},
"product_reference": "k6-fish-completion-1.5.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-fish-completion-1.5.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.x86_64"
},
"product_reference": "k6-fish-completion-1.5.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-zsh-completion-1.5.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.aarch64"
},
"product_reference": "k6-zsh-completion-1.5.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-zsh-completion-1.5.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.ppc64le"
},
"product_reference": "k6-zsh-completion-1.5.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-zsh-completion-1.5.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.s390x"
},
"product_reference": "k6-zsh-completion-1.5.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "k6-zsh-completion-1.5.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.x86_64"
},
"product_reference": "k6-zsh-completion-1.5.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:k6-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-1.5.0-1.1.x86_64",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.x86_64",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.x86_64",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:k6-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-1.5.0-1.1.x86_64",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.x86_64",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.x86_64",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:k6-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-1.5.0-1.1.x86_64",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-bash-completion-1.5.0-1.1.x86_64",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-fish-completion-1.5.0-1.1.x86_64",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.aarch64",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.ppc64le",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.s390x",
"openSUSE Tumbleweed:k6-zsh-completion-1.5.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
OPENSUSE-SU-2025:20157-1
Vulnerability from csaf_opensuse - Published: 2025-12-12 07:23 - Updated: 2025-12-12 07:23Summary
Security update for go1.25
Notes
Title of the patch
Security update for go1.25
Description of the patch
This update for go1.25 fixes the following issues:
Update to go1.25.5.
Security issues fixed:
- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation
(bsc#1254431).
- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN (bsc#1254430).
- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).
- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).
- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).
- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).
- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).
- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).
- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).
- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion
(bsc#1251258).
- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).
- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).
- CVE-2025-47910: net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141).
Other issues fixed and changes:
- Version 1.25.5:
* go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25
* go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access
is denied, ReOpenFile error handling followup
- Version 1.25.4:
* go#75480 cmd/link: linker panic and relocation errors with complex generics inlining
* go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64
* go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS
* go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets
* go#75952 encoding/pem: regression when decoding blocks with leading garbage
* go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access
is denied
* go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should
* go#76029 pem/encoding: malformed line endings can cause panics
- Version 1.25.3:
* go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot
* go#75777 spec: Go1.25 spec should be dated closer to actual release date
- Version 1.25.2:
* go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt
* go#75116 os: Root.MkdirAll can return "file exists" when called concurrently on the same path
* go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root
* go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21
* go#75255 cmd/compile: export to DWARF types only referenced through interfaces
* go#75347 testing/synctest: test timeout with no runnable goroutines
* go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9
* go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail
* go#75537 context: Err can return non-nil before Done channel is closed
* go#75539 net/http: internal error: connCount underflow
* go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn
* go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value
* go#75669 runtime: debug.decoratemappings don't work as expected
- Version 1.25.1:
* go#74822 cmd/go: "get toolchain@latest" should ignore release candidates
* go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets
* go#75008 os/exec: TestLookPath fails on plan9 after CL 685755
* go#75021 testing/synctest: bubble not terminating
* go#75083 os: File.Seek doesn't set the correct offset with Windows overlapped handles
- Packaging: migrate from update-alternatives to libalternatives (bsc#1245878).
- Fix runtime condition for gcc/gcc7 dependency.
- Use at least gcc 7 for all architectures (bsc#1254227).
- Package svgpan.js to fix issues with "go tool pprof" (boo#1249985).
- Drop unused gccgo bootstrap code in go1.22+ (bsc#1248082).
Patchnames
openSUSE-Leap-16.0-102
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25 fixes the following issues:\n\nUpdate to go1.25.5.\n\nSecurity issues fixed:\n\n- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation\n (bsc#1254431).\n- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion\n (bsc#1251258).\n- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n- CVE-2025-47910: net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141).\n\nOther issues fixed and changes:\n\n- Version 1.25.5:\n * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25\n * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access\n is denied, ReOpenFile error handling followup\n\n- Version 1.25.4:\n * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining\n * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64\n * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS\n * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75952 encoding/pem: regression when decoding blocks with leading garbage\n * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access\n is denied\n * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should\n * go#76029 pem/encoding: malformed line endings can cause panics\n\n- Version 1.25.3:\n * go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75777 spec: Go1.25 spec should be dated closer to actual release date\n\n- Version 1.25.2:\n * go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt\n * go#75116 os: Root.MkdirAll can return \"file exists\" when called concurrently on the same path\n * go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75255 cmd/compile: export to DWARF types only referenced through interfaces\n * go#75347 testing/synctest: test timeout with no runnable goroutines\n * go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75537 context: Err can return non-nil before Done channel is closed\n * go#75539 net/http: internal error: connCount underflow\n * go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75669 runtime: debug.decoratemappings don\u0027t work as expected\n\n- Version 1.25.1:\n * go#74822 cmd/go: \"get toolchain@latest\" should ignore release candidates\n * go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#75008 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75021 testing/synctest: bubble not terminating\n * go#75083 os: File.Seek doesn\u0027t set the correct offset with Windows overlapped handles\n\n- Packaging: migrate from update-alternatives to libalternatives (bsc#1245878).\n- Fix runtime condition for gcc/gcc7 dependency.\n- Use at least gcc 7 for all architectures (bsc#1254227).\n- Package svgpan.js to fix issues with \"go tool pprof\" (boo#1249985).\n- Drop unused gccgo bootstrap code in go1.22+ (bsc#1248082).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-102",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_20157-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249141",
"url": "https://bugzilla.suse.com/1249141"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254227",
"url": "https://bugzilla.suse.com/1254227"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47910 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "Security update for go1.25",
"tracking": {
"current_release_date": "2025-12-12T07:23:58Z",
"generator": {
"date": "2025-12-12T07:23:58Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:20157-1",
"initial_release_date": "2025-12-12T07:23:58Z",
"revision_history": [
{
"date": "2025-12-12T07:23:58Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-160000.1.1.aarch64",
"product": {
"name": "go1.25-1.25.5-160000.1.1.aarch64",
"product_id": "go1.25-1.25.5-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-160000.1.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.5-160000.1.1.aarch64",
"product_id": "go1.25-doc-1.25.5-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.5-160000.1.1.aarch64",
"product": {
"name": "go1.25-libstd-1.25.5-160000.1.1.aarch64",
"product_id": "go1.25-libstd-1.25.5-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-160000.1.1.aarch64",
"product": {
"name": "go1.25-race-1.25.5-160000.1.1.aarch64",
"product_id": "go1.25-race-1.25.5-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-160000.1.1.ppc64le",
"product": {
"name": "go1.25-1.25.5-160000.1.1.ppc64le",
"product_id": "go1.25-1.25.5-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-160000.1.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.5-160000.1.1.ppc64le",
"product_id": "go1.25-doc-1.25.5-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-160000.1.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.5-160000.1.1.ppc64le",
"product_id": "go1.25-race-1.25.5-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-160000.1.1.s390x",
"product": {
"name": "go1.25-1.25.5-160000.1.1.s390x",
"product_id": "go1.25-1.25.5-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-160000.1.1.s390x",
"product": {
"name": "go1.25-doc-1.25.5-160000.1.1.s390x",
"product_id": "go1.25-doc-1.25.5-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-160000.1.1.s390x",
"product": {
"name": "go1.25-race-1.25.5-160000.1.1.s390x",
"product_id": "go1.25-race-1.25.5-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-160000.1.1.x86_64",
"product": {
"name": "go1.25-1.25.5-160000.1.1.x86_64",
"product_id": "go1.25-1.25.5-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-160000.1.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.5-160000.1.1.x86_64",
"product_id": "go1.25-doc-1.25.5-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.5-160000.1.1.x86_64",
"product": {
"name": "go1.25-libstd-1.25.5-160000.1.1.x86_64",
"product_id": "go1.25-libstd-1.25.5-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-160000.1.1.x86_64",
"product": {
"name": "go1.25-race-1.25.5-160000.1.1.x86_64",
"product_id": "go1.25-race-1.25.5-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x"
},
"product_reference": "go1.25-1.25.5-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.5-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.5-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47910"
}
],
"notes": [
{
"category": "general",
"text": "When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47910",
"url": "https://www.suse.com/security/cve/CVE-2025-47910"
},
{
"category": "external",
"summary": "SUSE Bug 1249141 for CVE-2025-47910",
"url": "https://bugzilla.suse.com/1249141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "moderate"
}
],
"title": "CVE-2025-47910"
},
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:23:58Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
OPENSUSE-SU-2025:15817-1
Vulnerability from csaf_opensuse - Published: 2025-12-12 00:00 - Updated: 2025-12-12 00:00Summary
buildpacks-cli-0.39.1-1.1 on GA media
Notes
Title of the patch
buildpacks-cli-0.39.1-1.1 on GA media
Description of the patch
These are all security issues fixed in the buildpacks-cli-0.39.1-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15817
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "buildpacks-cli-0.39.1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the buildpacks-cli-0.39.1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15817",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15817-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "buildpacks-cli-0.39.1-1.1 on GA media",
"tracking": {
"current_release_date": "2025-12-12T00:00:00Z",
"generator": {
"date": "2025-12-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15817-1",
"initial_release_date": "2025-12-12T00:00:00Z",
"revision_history": [
{
"date": "2025-12-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "buildpacks-cli-0.39.1-1.1.aarch64",
"product": {
"name": "buildpacks-cli-0.39.1-1.1.aarch64",
"product_id": "buildpacks-cli-0.39.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.aarch64",
"product": {
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.aarch64",
"product_id": "buildpacks-cli-bash-completion-0.39.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.aarch64",
"product": {
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.aarch64",
"product_id": "buildpacks-cli-fish-completion-0.39.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64",
"product": {
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64",
"product_id": "buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildpacks-cli-0.39.1-1.1.ppc64le",
"product": {
"name": "buildpacks-cli-0.39.1-1.1.ppc64le",
"product_id": "buildpacks-cli-0.39.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le",
"product": {
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le",
"product_id": "buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le",
"product": {
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le",
"product_id": "buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le",
"product": {
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le",
"product_id": "buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "buildpacks-cli-0.39.1-1.1.s390x",
"product": {
"name": "buildpacks-cli-0.39.1-1.1.s390x",
"product_id": "buildpacks-cli-0.39.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.s390x",
"product": {
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.s390x",
"product_id": "buildpacks-cli-bash-completion-0.39.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.s390x",
"product": {
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.s390x",
"product_id": "buildpacks-cli-fish-completion-0.39.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.s390x",
"product": {
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.s390x",
"product_id": "buildpacks-cli-zsh-completion-0.39.1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "buildpacks-cli-0.39.1-1.1.x86_64",
"product": {
"name": "buildpacks-cli-0.39.1-1.1.x86_64",
"product_id": "buildpacks-cli-0.39.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.x86_64",
"product": {
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.x86_64",
"product_id": "buildpacks-cli-bash-completion-0.39.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.x86_64",
"product": {
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.x86_64",
"product_id": "buildpacks-cli-fish-completion-0.39.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64",
"product": {
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64",
"product_id": "buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-0.39.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.aarch64"
},
"product_reference": "buildpacks-cli-0.39.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-0.39.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.ppc64le"
},
"product_reference": "buildpacks-cli-0.39.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-0.39.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.s390x"
},
"product_reference": "buildpacks-cli-0.39.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-0.39.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.x86_64"
},
"product_reference": "buildpacks-cli-0.39.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.aarch64"
},
"product_reference": "buildpacks-cli-bash-completion-0.39.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le"
},
"product_reference": "buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.s390x"
},
"product_reference": "buildpacks-cli-bash-completion-0.39.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-bash-completion-0.39.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.x86_64"
},
"product_reference": "buildpacks-cli-bash-completion-0.39.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.aarch64"
},
"product_reference": "buildpacks-cli-fish-completion-0.39.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le"
},
"product_reference": "buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.s390x"
},
"product_reference": "buildpacks-cli-fish-completion-0.39.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-fish-completion-0.39.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.x86_64"
},
"product_reference": "buildpacks-cli-fish-completion-0.39.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64"
},
"product_reference": "buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le"
},
"product_reference": "buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.s390x"
},
"product_reference": "buildpacks-cli-zsh-completion-0.39.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64"
},
"product_reference": "buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-bash-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-fish-completion-0.39.1-1.1.x86_64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.aarch64",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.ppc64le",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.s390x",
"openSUSE Tumbleweed:buildpacks-cli-zsh-completion-0.39.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
OPENSUSE-SU-2025:20158-1
Vulnerability from csaf_opensuse - Published: 2025-12-12 07:45 - Updated: 2025-12-12 07:45Summary
Security update for go1.24
Notes
Title of the patch
Security update for go1.24
Description of the patch
This update for go1.24 fixes the following issues:
Update to go1.24.11.
Security issues fixed:
- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).
- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).
- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion
(bsc#1251258).
- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).
- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).
- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).
- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).
- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).
- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).
- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).
- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN (bsc#1254430).
- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation
(bsc#1254431).
Other issues fixed and changes:
- Version 1.24.11:
* go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364
cores
- Version 1.24.10:
* go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets
* go#75951 encoding/pem: regression when decoding blocks with leading garbage
* go#76028 pem/encoding: malformed line endings can cause panics
- Version 1.24.9:
* go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot
- Version 1.24.8:
* go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root
* go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21
* go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol
* go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9
* go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9
* go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail
* go#75538 net/http: internal error: connCount underflow
* go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn
* go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value
- Version 1.24.7:
* go#75007 os/exec: TestLookPath fails on plan9 after CL 685755
* go#74821 cmd/go: "get toolchain@latest" should ignore release candidates
* go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets
- Packaging: migrate from update-alternatives to libalternatives (bsc#1245878).
- Package svgpan.js to fix issues with "go tool pprof" (bsc#1249985).
- Drop unused gccgo bootstrap code in go1.22+ (bsc#1248082).
Patchnames
openSUSE-Leap-16.0-103
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24 fixes the following issues:\n\nUpdate to go1.24.11.\n\nSecurity issues fixed:\n\n- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion\n (bsc#1251258).\n- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation\n (bsc#1254431).\n\n\nOther issues fixed and changes:\n\n- Version 1.24.11:\n * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364\n cores\n\n- Version 1.24.10:\n * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75951 encoding/pem: regression when decoding blocks with leading garbage\n * go#76028 pem/encoding: malformed line endings can cause panics\n\n- Version 1.24.9:\n * go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot\n\n- Version 1.24.8:\n * go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol\n * go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9\n * go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75538 net/http: internal error: connCount underflow\n * go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n\n- Version 1.24.7:\n * go#75007 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#74821 cmd/go: \"get toolchain@latest\" should ignore release candidates\n * go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n\n- Packaging: migrate from update-alternatives to libalternatives (bsc#1245878).\n- Package svgpan.js to fix issues with \"go tool pprof\" (bsc#1249985).\n- Drop unused gccgo bootstrap code in go1.22+ (bsc#1248082).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-103",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_20158-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "Security update for go1.24",
"tracking": {
"current_release_date": "2025-12-12T07:45:01Z",
"generator": {
"date": "2025-12-12T07:45:01Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:20158-1",
"initial_release_date": "2025-12-12T07:45:01Z",
"revision_history": [
{
"date": "2025-12-12T07:45:01Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-160000.1.1.aarch64",
"product": {
"name": "go1.24-1.24.11-160000.1.1.aarch64",
"product_id": "go1.24-1.24.11-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-160000.1.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.11-160000.1.1.aarch64",
"product_id": "go1.24-doc-1.24.11-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.11-160000.1.1.aarch64",
"product": {
"name": "go1.24-libstd-1.24.11-160000.1.1.aarch64",
"product_id": "go1.24-libstd-1.24.11-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-160000.1.1.aarch64",
"product": {
"name": "go1.24-race-1.24.11-160000.1.1.aarch64",
"product_id": "go1.24-race-1.24.11-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-160000.1.1.ppc64le",
"product": {
"name": "go1.24-1.24.11-160000.1.1.ppc64le",
"product_id": "go1.24-1.24.11-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-160000.1.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.11-160000.1.1.ppc64le",
"product_id": "go1.24-doc-1.24.11-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-160000.1.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.11-160000.1.1.ppc64le",
"product_id": "go1.24-race-1.24.11-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-160000.1.1.s390x",
"product": {
"name": "go1.24-1.24.11-160000.1.1.s390x",
"product_id": "go1.24-1.24.11-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-160000.1.1.s390x",
"product": {
"name": "go1.24-doc-1.24.11-160000.1.1.s390x",
"product_id": "go1.24-doc-1.24.11-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-160000.1.1.s390x",
"product": {
"name": "go1.24-race-1.24.11-160000.1.1.s390x",
"product_id": "go1.24-race-1.24.11-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-160000.1.1.x86_64",
"product": {
"name": "go1.24-1.24.11-160000.1.1.x86_64",
"product_id": "go1.24-1.24.11-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-160000.1.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.11-160000.1.1.x86_64",
"product_id": "go1.24-doc-1.24.11-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.11-160000.1.1.x86_64",
"product": {
"name": "go1.24-libstd-1.24.11-160000.1.1.x86_64",
"product_id": "go1.24-libstd-1.24.11-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-160000.1.1.x86_64",
"product": {
"name": "go1.24-race-1.24.11-160000.1.1.x86_64",
"product_id": "go1.24-race-1.24.11-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x"
},
"product_reference": "go1.24-1.24.11-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.11-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.11-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:01Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
OPENSUSE-SU-2025:15807-1
Vulnerability from csaf_opensuse - Published: 2025-12-09 00:00 - Updated: 2025-12-09 00:00Summary
regclient-0.11.1-1.1 on GA media
Notes
Title of the patch
regclient-0.11.1-1.1 on GA media
Description of the patch
These are all security issues fixed in the regclient-0.11.1-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15807
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "regclient-0.11.1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the regclient-0.11.1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15807",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15807-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "regclient-0.11.1-1.1 on GA media",
"tracking": {
"current_release_date": "2025-12-09T00:00:00Z",
"generator": {
"date": "2025-12-09T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15807-1",
"initial_release_date": "2025-12-09T00:00:00Z",
"revision_history": [
{
"date": "2025-12-09T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "regclient-0.11.1-1.1.aarch64",
"product": {
"name": "regclient-0.11.1-1.1.aarch64",
"product_id": "regclient-0.11.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "regclient-bash-completion-0.11.1-1.1.aarch64",
"product": {
"name": "regclient-bash-completion-0.11.1-1.1.aarch64",
"product_id": "regclient-bash-completion-0.11.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "regclient-fish-completion-0.11.1-1.1.aarch64",
"product": {
"name": "regclient-fish-completion-0.11.1-1.1.aarch64",
"product_id": "regclient-fish-completion-0.11.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "regclient-zsh-completion-0.11.1-1.1.aarch64",
"product": {
"name": "regclient-zsh-completion-0.11.1-1.1.aarch64",
"product_id": "regclient-zsh-completion-0.11.1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "regclient-0.11.1-1.1.ppc64le",
"product": {
"name": "regclient-0.11.1-1.1.ppc64le",
"product_id": "regclient-0.11.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "regclient-bash-completion-0.11.1-1.1.ppc64le",
"product": {
"name": "regclient-bash-completion-0.11.1-1.1.ppc64le",
"product_id": "regclient-bash-completion-0.11.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "regclient-fish-completion-0.11.1-1.1.ppc64le",
"product": {
"name": "regclient-fish-completion-0.11.1-1.1.ppc64le",
"product_id": "regclient-fish-completion-0.11.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "regclient-zsh-completion-0.11.1-1.1.ppc64le",
"product": {
"name": "regclient-zsh-completion-0.11.1-1.1.ppc64le",
"product_id": "regclient-zsh-completion-0.11.1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "regclient-0.11.1-1.1.s390x",
"product": {
"name": "regclient-0.11.1-1.1.s390x",
"product_id": "regclient-0.11.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "regclient-bash-completion-0.11.1-1.1.s390x",
"product": {
"name": "regclient-bash-completion-0.11.1-1.1.s390x",
"product_id": "regclient-bash-completion-0.11.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "regclient-fish-completion-0.11.1-1.1.s390x",
"product": {
"name": "regclient-fish-completion-0.11.1-1.1.s390x",
"product_id": "regclient-fish-completion-0.11.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "regclient-zsh-completion-0.11.1-1.1.s390x",
"product": {
"name": "regclient-zsh-completion-0.11.1-1.1.s390x",
"product_id": "regclient-zsh-completion-0.11.1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "regclient-0.11.1-1.1.x86_64",
"product": {
"name": "regclient-0.11.1-1.1.x86_64",
"product_id": "regclient-0.11.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "regclient-bash-completion-0.11.1-1.1.x86_64",
"product": {
"name": "regclient-bash-completion-0.11.1-1.1.x86_64",
"product_id": "regclient-bash-completion-0.11.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "regclient-fish-completion-0.11.1-1.1.x86_64",
"product": {
"name": "regclient-fish-completion-0.11.1-1.1.x86_64",
"product_id": "regclient-fish-completion-0.11.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "regclient-zsh-completion-0.11.1-1.1.x86_64",
"product": {
"name": "regclient-zsh-completion-0.11.1-1.1.x86_64",
"product_id": "regclient-zsh-completion-0.11.1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-0.11.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-0.11.1-1.1.aarch64"
},
"product_reference": "regclient-0.11.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-0.11.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-0.11.1-1.1.ppc64le"
},
"product_reference": "regclient-0.11.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-0.11.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-0.11.1-1.1.s390x"
},
"product_reference": "regclient-0.11.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-0.11.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-0.11.1-1.1.x86_64"
},
"product_reference": "regclient-0.11.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-bash-completion-0.11.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.aarch64"
},
"product_reference": "regclient-bash-completion-0.11.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-bash-completion-0.11.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.ppc64le"
},
"product_reference": "regclient-bash-completion-0.11.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-bash-completion-0.11.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.s390x"
},
"product_reference": "regclient-bash-completion-0.11.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-bash-completion-0.11.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.x86_64"
},
"product_reference": "regclient-bash-completion-0.11.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-fish-completion-0.11.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.aarch64"
},
"product_reference": "regclient-fish-completion-0.11.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-fish-completion-0.11.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.ppc64le"
},
"product_reference": "regclient-fish-completion-0.11.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-fish-completion-0.11.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.s390x"
},
"product_reference": "regclient-fish-completion-0.11.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-fish-completion-0.11.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.x86_64"
},
"product_reference": "regclient-fish-completion-0.11.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-zsh-completion-0.11.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.aarch64"
},
"product_reference": "regclient-zsh-completion-0.11.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-zsh-completion-0.11.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.ppc64le"
},
"product_reference": "regclient-zsh-completion-0.11.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-zsh-completion-0.11.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.s390x"
},
"product_reference": "regclient-zsh-completion-0.11.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "regclient-zsh-completion-0.11.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.x86_64"
},
"product_reference": "regclient-zsh-completion-0.11.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:regclient-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:regclient-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:regclient-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-09T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:regclient-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:regclient-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:regclient-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-bash-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-fish-completion-0.11.1-1.1.x86_64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.aarch64",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.ppc64le",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.s390x",
"openSUSE Tumbleweed:regclient-zsh-completion-0.11.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-09T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
SUSE-SU-2026:0297-1
Vulnerability from csaf_suse - Published: 2026-01-26 16:10 - Updated: 2026-01-26 16:10Summary
Security update for go1.25-openssl
Notes
Title of the patch
Security update for go1.25-openssl
Description of the patch
This update for go1.25-openssl fixes the following issues:
Update to version 1.25.6 (released 2026-01-15) (jsc#SLE-18320, bsc#1244485):
Security fixes:
- CVE-2025-4674 cmd/go: disable support for multiple vcs in one module (bsc#1246118).
- CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of '', '.' and '..' in some PATH configurations (bsc#1247719).
- CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan (bsc#1247720).
- CVE-2025-47910 net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141).
- CVE-2025-47912 net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).
- CVE-2025-58183 archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).
- CVE-2025-58185 encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).
- CVE-2025-58186 net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).
- CVE-2025-58187 crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).
- CVE-2025-58188 crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).
- CVE-2025-58189 crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).
- CVE-2025-61723 encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).
- CVE-2025-61724 net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).
- CVE-2025-61725 net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).
- CVE-2025-61726 net/http: memory exhaustion in Request.ParseForm (bsc#1256817).
- CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN (bsc#1254430).
- CVE-2025-61728 archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).
- CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).
- CVE-2025-61730 crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).
- CVE-2025-61731 cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).
- CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).
- CVE-2025-68121 crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).
Other fixes:
* go#74822 cmd/go: 'get toolchain@latest' should ignore release candidates
* go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets
* go#75008 os/exec: TestLookPath fails on plan9 after CL 685755
* go#75021 testing/synctest: bubble not terminating
* go#75083 os: File.Seek doesn't set the correct offset with Windows overlapped handles
* go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt
* go#75116 os: Root.MkdirAll can return 'file exists' when called concurrently on the same path
* go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root
* go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21
* go#75255 cmd/compile: export to DWARF types only referenced through interfaces
* go#75347 testing/synctest: test timeout with no runnable goroutines
* go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9
* go#75480 cmd/link: linker panic and relocation errors with complex generics inlining
* go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail
* go#75537 context: Err can return non-nil before Done channel is closed
* go#75539 net/http: internal error: connCount underflow
* go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn
* go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value
* go#75669 runtime: debug.decoratemappings don't work as expected
* go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64
* go#75777 spec: Go1.25 spec should be dated closer to actual release date
* go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS
* go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets
* go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot
* go#75952 encoding/pem: regression when decoding blocks with leading garbage
* go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied
* go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should
* go#76029 pem/encoding: malformed line endings can cause panics
* go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25
* go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied, ReOpenFile error handling followup
* go#76392 os: package initialization hangs is Stdin is blocked
* go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled
* go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes
* go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386
* go#76776 runtime: race detector crash on ppc64le
* go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling <function>: runtime error: index out of range
* go#76973 errors: errors.Join behavior changed in 1.25
Patchnames
SUSE-2026-297,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-297,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-297,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-297,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-297,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-297,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-297,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-297,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-297
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25-openssl fixes the following issues:\n\nUpdate to version 1.25.6 (released 2026-01-15) (jsc#SLE-18320, bsc#1244485):\n\nSecurity fixes:\n\n - CVE-2025-4674 cmd/go: disable support for multiple vcs in one module (bsc#1246118).\n - CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of \u0027\u0027, \u0027.\u0027 and \u0027..\u0027 in some PATH configurations (bsc#1247719).\n - CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan (bsc#1247720).\n - CVE-2025-47910 net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141).\n - CVE-2025-47912 net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n - CVE-2025-58183 archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n - CVE-2025-58185 encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).\n - CVE-2025-58186 net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n - CVE-2025-58187 crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n - CVE-2025-58188 crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n - CVE-2025-58189 crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n - CVE-2025-61723 encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n - CVE-2025-61724 net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n - CVE-2025-61725 net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n - CVE-2025-61726 net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n - CVE-2025-61728 archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).\n - CVE-2025-61730 crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-61731 cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-68121 crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#74822 cmd/go: \u0027get toolchain@latest\u0027 should ignore release candidates\n * go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#75008 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75021 testing/synctest: bubble not terminating\n * go#75083 os: File.Seek doesn\u0027t set the correct offset with Windows overlapped handles\n * go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt\n * go#75116 os: Root.MkdirAll can return \u0027file exists\u0027 when called concurrently on the same path\n * go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75255 cmd/compile: export to DWARF types only referenced through interfaces\n * go#75347 testing/synctest: test timeout with no runnable goroutines\n * go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining\n * go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75537 context: Err can return non-nil before Done channel is closed\n * go#75539 net/http: internal error: connCount underflow\n * go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75669 runtime: debug.decoratemappings don\u0027t work as expected\n * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64\n * go#75777 spec: Go1.25 spec should be dated closer to actual release date\n * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS\n * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75952 encoding/pem: regression when decoding blocks with leading garbage\n * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied\n * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should\n * go#76029 pem/encoding: malformed line endings can cause panics\n * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25\n * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied, ReOpenFile error handling followup\n * go#76392 os: package initialization hangs is Stdin is blocked\n * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76776 runtime: race detector crash on ppc64le\n * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u003cfunction\u003e: runtime error: index out of range\n * go#76973 errors: errors.Join behavior changed in 1.25\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-297,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-297,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-297,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-297,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-297,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-297,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-297,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-297,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-297",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0297-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0297-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260297-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0297-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1246118",
"url": "https://bugzilla.suse.com/1246118"
},
{
"category": "self",
"summary": "SUSE Bug 1247719",
"url": "https://bugzilla.suse.com/1247719"
},
{
"category": "self",
"summary": "SUSE Bug 1247720",
"url": "https://bugzilla.suse.com/1247720"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249141",
"url": "https://bugzilla.suse.com/1249141"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254227",
"url": "https://bugzilla.suse.com/1254227"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4674 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47906 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47907 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47910 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25-openssl",
"tracking": {
"current_release_date": "2026-01-26T16:10:54Z",
"generator": {
"date": "2026-01-26T16:10:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0297-1",
"initial_release_date": "2026-01-26T16:10:54Z",
"revision_history": [
{
"date": "2026-01-26T16:10:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"product": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"product_id": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.i586",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.i586",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.i586"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.i586",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.i586",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"product_id": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"product": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"product_id": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"product": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"product_id": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-4674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4674"
}
],
"notes": [
{
"category": "general",
"text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4674",
"url": "https://www.suse.com/security/cve/CVE-2025-4674"
},
{
"category": "external",
"summary": "SUSE Bug 1246118 for CVE-2025-4674",
"url": "https://bugzilla.suse.com/1246118"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-4674"
},
{
"cve": "CVE-2025-47906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47906"
}
],
"notes": [
{
"category": "general",
"text": "If the PATH environment variable contains paths which are executables (rather than just directories), passing certain strings to LookPath (\"\", \".\", and \"..\"), can result in the binaries listed in the PATH being unexpectedly returned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47906",
"url": "https://www.suse.com/security/cve/CVE-2025-47906"
},
{
"category": "external",
"summary": "SUSE Bug 1247719 for CVE-2025-47906",
"url": "https://bugzilla.suse.com/1247719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-47906"
},
{
"cve": "CVE-2025-47907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47907"
}
],
"notes": [
{
"category": "general",
"text": "Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the expected results with those of another query, causing the call to Scan to return either unexpected results from the other query or an error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47907",
"url": "https://www.suse.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "SUSE Bug 1247720 for CVE-2025-47907",
"url": "https://bugzilla.suse.com/1247720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-47907"
},
{
"cve": "CVE-2025-47910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47910"
}
],
"notes": [
{
"category": "general",
"text": "When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47910",
"url": "https://www.suse.com/security/cve/CVE-2025-47910"
},
{
"category": "external",
"summary": "SUSE Bug 1249141 for CVE-2025-47910",
"url": "https://bugzilla.suse.com/1249141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-47910"
},
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2025:21192-1
Vulnerability from csaf_suse - Published: 2025-12-12 07:24 - Updated: 2025-12-12 07:24Summary
Security update for go1.25
Notes
Title of the patch
Security update for go1.25
Description of the patch
This update for go1.25 fixes the following issues:
Update to go1.25.5.
Security issues fixed:
- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation
(bsc#1254431).
- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN (bsc#1254430).
- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).
- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).
- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).
- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).
- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).
- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).
- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).
- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion
(bsc#1251258).
- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).
- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).
- CVE-2025-47910: net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141).
Other issues fixed and changes:
- Version 1.25.5:
* go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25
* go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access
is denied, ReOpenFile error handling followup
- Version 1.25.4:
* go#75480 cmd/link: linker panic and relocation errors with complex generics inlining
* go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64
* go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS
* go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets
* go#75952 encoding/pem: regression when decoding blocks with leading garbage
* go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access
is denied
* go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should
* go#76029 pem/encoding: malformed line endings can cause panics
- Version 1.25.3:
* go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot
* go#75777 spec: Go1.25 spec should be dated closer to actual release date
- Version 1.25.2:
* go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt
* go#75116 os: Root.MkdirAll can return "file exists" when called concurrently on the same path
* go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root
* go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21
* go#75255 cmd/compile: export to DWARF types only referenced through interfaces
* go#75347 testing/synctest: test timeout with no runnable goroutines
* go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9
* go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail
* go#75537 context: Err can return non-nil before Done channel is closed
* go#75539 net/http: internal error: connCount underflow
* go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn
* go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value
* go#75669 runtime: debug.decoratemappings don't work as expected
- Version 1.25.1:
* go#74822 cmd/go: "get toolchain@latest" should ignore release candidates
* go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets
* go#75008 os/exec: TestLookPath fails on plan9 after CL 685755
* go#75021 testing/synctest: bubble not terminating
* go#75083 os: File.Seek doesn't set the correct offset with Windows overlapped handles
- Packaging: migrate from update-alternatives to libalternatives (bsc#1245878).
- Fix runtime condition for gcc/gcc7 dependency.
- Use at least gcc 7 for all architectures (bsc#1254227).
- Package svgpan.js to fix issues with "go tool pprof" (boo#1249985).
- Drop unused gccgo bootstrap code in go1.22+ (bsc#1248082).
Patchnames
SUSE-SLES-16.0-102
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25 fixes the following issues:\n\nUpdate to go1.25.5.\n\nSecurity issues fixed:\n\n- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation\n (bsc#1254431).\n- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion\n (bsc#1251258).\n- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n- CVE-2025-47910: net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141).\n\nOther issues fixed and changes:\n\n- Version 1.25.5:\n * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25\n * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access\n is denied, ReOpenFile error handling followup\n\n- Version 1.25.4:\n * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining\n * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64\n * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS\n * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75952 encoding/pem: regression when decoding blocks with leading garbage\n * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access\n is denied\n * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should\n * go#76029 pem/encoding: malformed line endings can cause panics\n\n- Version 1.25.3:\n * go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75777 spec: Go1.25 spec should be dated closer to actual release date\n\n- Version 1.25.2:\n * go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt\n * go#75116 os: Root.MkdirAll can return \"file exists\" when called concurrently on the same path\n * go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75255 cmd/compile: export to DWARF types only referenced through interfaces\n * go#75347 testing/synctest: test timeout with no runnable goroutines\n * go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75537 context: Err can return non-nil before Done channel is closed\n * go#75539 net/http: internal error: connCount underflow\n * go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75669 runtime: debug.decoratemappings don\u0027t work as expected\n\n- Version 1.25.1:\n * go#74822 cmd/go: \"get toolchain@latest\" should ignore release candidates\n * go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#75008 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75021 testing/synctest: bubble not terminating\n * go#75083 os: File.Seek doesn\u0027t set the correct offset with Windows overlapped handles\n\n- Packaging: migrate from update-alternatives to libalternatives (bsc#1245878).\n- Fix runtime condition for gcc/gcc7 dependency.\n- Use at least gcc 7 for all architectures (bsc#1254227).\n- Package svgpan.js to fix issues with \"go tool pprof\" (boo#1249985).\n- Drop unused gccgo bootstrap code in go1.22+ (bsc#1248082).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-102",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_21192-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:21192-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202521192-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:21192-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023549.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249141",
"url": "https://bugzilla.suse.com/1249141"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254227",
"url": "https://bugzilla.suse.com/1254227"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47910 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "Security update for go1.25",
"tracking": {
"current_release_date": "2025-12-12T07:24:50Z",
"generator": {
"date": "2025-12-12T07:24:50Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:21192-1",
"initial_release_date": "2025-12-12T07:24:50Z",
"revision_history": [
{
"date": "2025-12-12T07:24:50Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-160000.1.1.aarch64",
"product": {
"name": "go1.25-1.25.5-160000.1.1.aarch64",
"product_id": "go1.25-1.25.5-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-160000.1.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.5-160000.1.1.aarch64",
"product_id": "go1.25-doc-1.25.5-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.5-160000.1.1.aarch64",
"product": {
"name": "go1.25-libstd-1.25.5-160000.1.1.aarch64",
"product_id": "go1.25-libstd-1.25.5-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-160000.1.1.aarch64",
"product": {
"name": "go1.25-race-1.25.5-160000.1.1.aarch64",
"product_id": "go1.25-race-1.25.5-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-160000.1.1.ppc64le",
"product": {
"name": "go1.25-1.25.5-160000.1.1.ppc64le",
"product_id": "go1.25-1.25.5-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-160000.1.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.5-160000.1.1.ppc64le",
"product_id": "go1.25-doc-1.25.5-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-160000.1.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.5-160000.1.1.ppc64le",
"product_id": "go1.25-race-1.25.5-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-160000.1.1.s390x",
"product": {
"name": "go1.25-1.25.5-160000.1.1.s390x",
"product_id": "go1.25-1.25.5-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-160000.1.1.s390x",
"product": {
"name": "go1.25-doc-1.25.5-160000.1.1.s390x",
"product_id": "go1.25-doc-1.25.5-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-160000.1.1.s390x",
"product": {
"name": "go1.25-race-1.25.5-160000.1.1.s390x",
"product_id": "go1.25-race-1.25.5-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-160000.1.1.x86_64",
"product": {
"name": "go1.25-1.25.5-160000.1.1.x86_64",
"product_id": "go1.25-1.25.5-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-160000.1.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.5-160000.1.1.x86_64",
"product_id": "go1.25-doc-1.25.5-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.5-160000.1.1.x86_64",
"product": {
"name": "go1.25-libstd-1.25.5-160000.1.1.x86_64",
"product_id": "go1.25-libstd-1.25.5-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-160000.1.1.x86_64",
"product": {
"name": "go1.25-race-1.25.5-160000.1.1.x86_64",
"product_id": "go1.25-race-1.25.5-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x"
},
"product_reference": "go1.25-1.25.5-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.5-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.5-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x"
},
"product_reference": "go1.25-1.25.5-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.5-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.5-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47910"
}
],
"notes": [
{
"category": "general",
"text": "When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47910",
"url": "https://www.suse.com/security/cve/CVE-2025-47910"
},
{
"category": "external",
"summary": "SUSE Bug 1249141 for CVE-2025-47910",
"url": "https://bugzilla.suse.com/1249141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "moderate"
}
],
"title": "CVE-2025-47910"
},
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.5-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.5-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:24:50Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
SUSE-SU-2025:4336-1
Vulnerability from csaf_suse - Published: 2025-12-09 23:50 - Updated: 2025-12-09 23:50Summary
Security update for go1.25
Notes
Title of the patch
Security update for go1.25
Description of the patch
This update for go1.25 fixes the following issues:
go1.25.5 (released 2025-12-02) includes two security fixes to the
crypto/x509 package, as well as bug fixes to the mime and os
packages.
(bsc#1244485)
CVE-2025-61729 CVE-2025-61727:
* go#76461 go#76445 bsc#1254431 security: fix CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation
* go#76464 go#76442 bsc#1254430 security: fix CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN
* go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25
* go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied, ReOpenFile error handling followup
- Packaging: Migrate from update-alternatives to libalternatives (bsc#1245878)
* This is an optional migration controlled via prjconf definition
with_libalternatives
* If with_libalternatives is not defined packaging continues to
use update-alternatives
go1.25.4 (released 2025-11-05) includes fixes to the compiler,
the runtime, and the crypto/subtle, encoding/pem, net/url, and os
packages. (bsc#1244485)
* go#75480 cmd/link: linker panic and relocation errors with complex generics inlining
* go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64
* go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS
* go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets
* go#75952 encoding/pem: regression when decoding blocks with leading garbage
* go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied
* go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should
* go#76029 pem/encoding: malformed line endings can cause panics
Patchnames
SUSE-2025-4336,SUSE-SLE-Module-Development-Tools-15-SP6-2025-4336,SUSE-SLE-Module-Development-Tools-15-SP7-2025-4336,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4336,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4336,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4336,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4336,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4336,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4336,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4336,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4336,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4336,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4336,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4336,SUSE-Storage-7.1-2025-4336,openSUSE-SLE-15.6-2025-4336
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25 fixes the following issues:\n\ngo1.25.5 (released 2025-12-02) includes two security fixes to the\ncrypto/x509 package, as well as bug fixes to the mime and os\npackages.\n(bsc#1244485)\n\n CVE-2025-61729 CVE-2025-61727:\n\n * go#76461 go#76445 bsc#1254431 security: fix CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation\n * go#76464 go#76442 bsc#1254430 security: fix CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN\n * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25\n * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied, ReOpenFile error handling followup\n\n- Packaging: Migrate from update-alternatives to libalternatives (bsc#1245878)\n\n * This is an optional migration controlled via prjconf definition\n with_libalternatives\n * If with_libalternatives is not defined packaging continues to\n use update-alternatives\n\ngo1.25.4 (released 2025-11-05) includes fixes to the compiler,\nthe runtime, and the crypto/subtle, encoding/pem, net/url, and os\npackages. (bsc#1244485)\n\n * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining\n * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64\n * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS\n * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75952 encoding/pem: regression when decoding blocks with leading garbage\n * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied\n * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should\n * go#76029 pem/encoding: malformed line endings can cause panics\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4336,SUSE-SLE-Module-Development-Tools-15-SP6-2025-4336,SUSE-SLE-Module-Development-Tools-15-SP7-2025-4336,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4336,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4336,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4336,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4336,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4336,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4336,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4336,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4336,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4336,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4336,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4336,SUSE-Storage-7.1-2025-4336,openSUSE-SLE-15.6-2025-4336",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4336-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4336-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254336-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4336-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023493.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1254227",
"url": "https://bugzilla.suse.com/1254227"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "Security update for go1.25",
"tracking": {
"current_release_date": "2025-12-09T23:50:12Z",
"generator": {
"date": "2025-12-09T23:50:12Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4336-1",
"initial_release_date": "2025-12-09T23:50:12Z",
"revision_history": [
{
"date": "2025-12-09T23:50:12Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-150000.1.23.1.aarch64",
"product": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64",
"product_id": "go1.25-1.25.5-150000.1.23.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"product_id": "go1.25-doc-1.25.5-150000.1.23.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"product": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"product_id": "go1.25-race-1.25.5-150000.1.23.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-150000.1.23.1.i586",
"product": {
"name": "go1.25-1.25.5-150000.1.23.1.i586",
"product_id": "go1.25-1.25.5-150000.1.23.1.i586"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-150000.1.23.1.i586",
"product": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.i586",
"product_id": "go1.25-doc-1.25.5-150000.1.23.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"product": {
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"product_id": "go1.25-1.25.5-150000.1.23.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"product_id": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"product_id": "go1.25-race-1.25.5-150000.1.23.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-150000.1.23.1.s390x",
"product": {
"name": "go1.25-1.25.5-150000.1.23.1.s390x",
"product_id": "go1.25-1.25.5-150000.1.23.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-150000.1.23.1.s390x",
"product": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.s390x",
"product_id": "go1.25-doc-1.25.5-150000.1.23.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-150000.1.23.1.s390x",
"product": {
"name": "go1.25-race-1.25.5-150000.1.23.1.s390x",
"product_id": "go1.25-race-1.25.5-150000.1.23.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.5-150000.1.23.1.x86_64",
"product": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64",
"product_id": "go1.25-1.25.5-150000.1.23.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"product_id": "go1.25-doc-1.25.5-150000.1.23.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"product": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"product_id": "go1.25-race-1.25.5-150000.1.23.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.5-150000.1.23.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.5-150000.1.23.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.aarch64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.s390x"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.5-150000.1.23.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.x86_64"
},
"product_reference": "go1.25-race-1.25.5-150000.1.23.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-09T23:50:12Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.5-150000.1.23.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.5-150000.1.23.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-09T23:50:12Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
SUSE-SU-2026:0296-1
Vulnerability from csaf_suse - Published: 2026-01-26 13:51 - Updated: 2026-01-26 13:51Summary
Security update for go1.24-openssl
Notes
Title of the patch
Security update for go1.24-openssl
Description of the patch
This update for go1.24-openssl fixes the following issues:
Update to version 1.24.12 (released 2026-01-15) (jsc#SLE-18320, bsc#1236217):
Security fixes:
- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).
- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).
- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).
- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).
- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).
- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).
- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).
- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).
- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).
- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).
- CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).
- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN (bsc#1254430).
- CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).
- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).
- CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).
- CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).
- CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).
- CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).
Other fixes:
* go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets
* go#74821 cmd/go: 'get toolchain@latest' should ignore release candidates
* go#75007 os/exec: TestLookPath fails on plan9 after CL 685755
* go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root
* go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21
* go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol
* go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9
* go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9
* go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail
* go#75538 net/http: internal error: connCount underflow
* go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn
* go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value
* go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets
* go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot
* go#75951 encoding/pem: regression when decoding blocks with leading garbage
* go#76028 pem/encoding: malformed line endings can cause panics
* go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores
* go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled
* go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes
* go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386
* go#76796 runtime: race detector crash on ppc64le
* go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling <function>: runtime error: index out of range
Patchnames
SUSE-2026-296,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-296,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-296,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-296,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-296,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-296,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-296,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-296,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-296
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24-openssl fixes the following issues:\n\nUpdate to version 1.24.12 (released 2026-01-15) (jsc#SLE-18320, bsc#1236217):\n\nSecurity fixes:\n\n - CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n - CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n - CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).\n - CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n - CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n - CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n - CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n - CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n - CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n - CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#74821 cmd/go: \u0027get toolchain@latest\u0027 should ignore release candidates\n * go#75007 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol\n * go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9\n * go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75538 net/http: internal error: connCount underflow\n * go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75951 encoding/pem: regression when decoding blocks with leading garbage\n * go#76028 pem/encoding: malformed line endings can cause panics\n * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores\n * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76796 runtime: race detector crash on ppc64le\n * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-296,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-296,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-296,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-296,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-296,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-296,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-296,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-296,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-296",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0296-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0296-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260296-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0296-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24-openssl",
"tracking": {
"current_release_date": "2026-01-26T13:51:05Z",
"generator": {
"date": "2026-01-26T13:51:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0296-1",
"initial_release_date": "2026-01-26T13:51:05Z",
"revision_history": [
{
"date": "2026-01-26T13:51:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"product": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"product_id": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.i586",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.i586",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.i586"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.i586",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.i586",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"product": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"product_id": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"product": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"product_id": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"product": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"product_id": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2025:4337-1
Vulnerability from csaf_suse - Published: 2025-12-09 23:51 - Updated: 2025-12-09 23:51Summary
Security update for go1.24
Notes
Title of the patch
Security update for go1.24
Description of the patch
This update for go1.24 fixes the following issues:
go1.24.11 (released 2025-12-02) includes two security fixes to
the crypto/x509 package, as well as bug fixes to the runtime. (bsc#1236217)
CVE-2025-61727 CVE-2025-61729:
* go#76460 go#76445 bsc#1254431 security: fix CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation
* go#76463 go#76442 bsc#1254430 security: fix CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN
* go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores
- Packaging: Migrate from update-alternatives to libalternatives (bsc#1245878)
* This is an optional migration controlled via prjconf definition
with_libalternatives
* If with_libalternatives is not defined packaging continues to
use update-alternatives
Patchnames
SUSE-2025-4337,SUSE-SLE-Module-Development-Tools-15-SP6-2025-4337,SUSE-SLE-Module-Development-Tools-15-SP7-2025-4337,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4337,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4337,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4337,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4337,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4337,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4337,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4337,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4337,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4337,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4337,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4337,SUSE-Storage-7.1-2025-4337,openSUSE-SLE-15.6-2025-4337
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24 fixes the following issues:\n\ngo1.24.11 (released 2025-12-02) includes two security fixes to\nthe crypto/x509 package, as well as bug fixes to the runtime. (bsc#1236217)\n\nCVE-2025-61727 CVE-2025-61729:\n\n * go#76460 go#76445 bsc#1254431 security: fix CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation\n * go#76463 go#76442 bsc#1254430 security: fix CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN\n\n * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores\n\n- Packaging: Migrate from update-alternatives to libalternatives (bsc#1245878)\n * This is an optional migration controlled via prjconf definition\n with_libalternatives\n * If with_libalternatives is not defined packaging continues to\n use update-alternatives\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4337,SUSE-SLE-Module-Development-Tools-15-SP6-2025-4337,SUSE-SLE-Module-Development-Tools-15-SP7-2025-4337,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4337,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4337,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4337,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4337,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4337,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4337,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4337,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4337,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4337,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4337,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4337,SUSE-Storage-7.1-2025-4337,openSUSE-SLE-15.6-2025-4337",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4337-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4337-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254337-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4337-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023492.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "Security update for go1.24",
"tracking": {
"current_release_date": "2025-12-09T23:51:31Z",
"generator": {
"date": "2025-12-09T23:51:31Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4337-1",
"initial_release_date": "2025-12-09T23:51:31Z",
"revision_history": [
{
"date": "2025-12-09T23:51:31Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-150000.1.50.1.aarch64",
"product": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64",
"product_id": "go1.24-1.24.11-150000.1.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"product_id": "go1.24-doc-1.24.11-150000.1.50.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"product": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"product_id": "go1.24-race-1.24.11-150000.1.50.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-150000.1.50.1.i586",
"product": {
"name": "go1.24-1.24.11-150000.1.50.1.i586",
"product_id": "go1.24-1.24.11-150000.1.50.1.i586"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-150000.1.50.1.i586",
"product": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.i586",
"product_id": "go1.24-doc-1.24.11-150000.1.50.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"product": {
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"product_id": "go1.24-1.24.11-150000.1.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"product_id": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"product_id": "go1.24-race-1.24.11-150000.1.50.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-150000.1.50.1.s390x",
"product": {
"name": "go1.24-1.24.11-150000.1.50.1.s390x",
"product_id": "go1.24-1.24.11-150000.1.50.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-150000.1.50.1.s390x",
"product": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.s390x",
"product_id": "go1.24-doc-1.24.11-150000.1.50.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-150000.1.50.1.s390x",
"product": {
"name": "go1.24-race-1.24.11-150000.1.50.1.s390x",
"product_id": "go1.24-race-1.24.11-150000.1.50.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-150000.1.50.1.x86_64",
"product": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64",
"product_id": "go1.24-1.24.11-150000.1.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"product_id": "go1.24-doc-1.24.11-150000.1.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"product": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"product_id": "go1.24-race-1.24.11-150000.1.50.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-150000.1.50.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-150000.1.50.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.s390x"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-150000.1.50.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-150000.1.50.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-09T23:51:31Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Enterprise Storage 7.1:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.11-150000.1.50.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.11-150000.1.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-09T23:51:31Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
SUSE-SU-2026:0298-1
Vulnerability from csaf_suse - Published: 2026-01-26 16:11 - Updated: 2026-01-26 16:11Summary
Security update for go1.25-openssl
Notes
Title of the patch
Security update for go1.25-openssl
Description of the patch
This update for go1.25-openssl fixes the following issues:
Update to version 1.25.6 (released 2026-01-15) (jsc#SLE-18320, bsc#1244485):
Security fixes:
- CVE-2025-4674 cmd/go: disable support for multiple vcs in one module (bsc#1246118).
- CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of '', '.' and '..' in some PATH configurations (bsc#1247719).
- CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan (bsc#1247720).
- CVE-2025-47910 net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141).
- CVE-2025-47912 net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).
- CVE-2025-58183 archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).
- CVE-2025-58185 encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).
- CVE-2025-58186 net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).
- CVE-2025-58187 crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).
- CVE-2025-58188 crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).
- CVE-2025-58189 crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).
- CVE-2025-61723 encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).
- CVE-2025-61724 net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).
- CVE-2025-61725 net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).
- CVE-2025-61726 net/http: memory exhaustion in Request.ParseForm (bsc#1256817).
- CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN (bsc#1254430).
- CVE-2025-61728 archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).
- CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).
- CVE-2025-61730 crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).
- CVE-2025-61731 cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).
- CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).
- CVE-2025-68121 crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).
Other fixes:
* go#74822 cmd/go: 'get toolchain@latest' should ignore release candidates
* go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets
* go#75008 os/exec: TestLookPath fails on plan9 after CL 685755
* go#75021 testing/synctest: bubble not terminating
* go#75083 os: File.Seek doesn't set the correct offset with Windows overlapped handles
* go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt
* go#75116 os: Root.MkdirAll can return 'file exists' when called concurrently on the same path
* go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root
* go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21
* go#75255 cmd/compile: export to DWARF types only referenced through interfaces
* go#75347 testing/synctest: test timeout with no runnable goroutines
* go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9
* go#75480 cmd/link: linker panic and relocation errors with complex generics inlining
* go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail
* go#75537 context: Err can return non-nil before Done channel is closed
* go#75539 net/http: internal error: connCount underflow
* go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn
* go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value
* go#75669 runtime: debug.decoratemappings don't work as expected
* go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64
* go#75777 spec: Go1.25 spec should be dated closer to actual release date
* go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS
* go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets
* go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot
* go#75952 encoding/pem: regression when decoding blocks with leading garbage
* go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied
* go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should
* go#76029 pem/encoding: malformed line endings can cause panics
* go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25
* go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied, ReOpenFile error handling followup
* go#76392 os: package initialization hangs is Stdin is blocked
* go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled
* go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes
* go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386
* go#76776 runtime: race detector crash on ppc64le
* go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling <function>: runtime error: index out of range
* go#76973 errors: errors.Join behavior changed in 1.25
Patchnames
SUSE-2026-298,SUSE-SLE-Module-Development-Tools-15-SP7-2026-298,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-298,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-298,openSUSE-SLE-15.6-2026-298
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25-openssl fixes the following issues:\n\nUpdate to version 1.25.6 (released 2026-01-15) (jsc#SLE-18320, bsc#1244485):\n\nSecurity fixes:\n\n - CVE-2025-4674 cmd/go: disable support for multiple vcs in one module (bsc#1246118).\n - CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of \u0027\u0027, \u0027.\u0027 and \u0027..\u0027 in some PATH configurations (bsc#1247719).\n - CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan (bsc#1247720).\n - CVE-2025-47910 net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141).\n - CVE-2025-47912 net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n - CVE-2025-58183 archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n - CVE-2025-58185 encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).\n - CVE-2025-58186 net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n - CVE-2025-58187 crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n - CVE-2025-58188 crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n - CVE-2025-58189 crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n - CVE-2025-61723 encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n - CVE-2025-61724 net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n - CVE-2025-61725 net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n - CVE-2025-61726 net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n - CVE-2025-61728 archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).\n - CVE-2025-61730 crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-61731 cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-68121 crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#74822 cmd/go: \u0027get toolchain@latest\u0027 should ignore release candidates\n * go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#75008 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75021 testing/synctest: bubble not terminating\n * go#75083 os: File.Seek doesn\u0027t set the correct offset with Windows overlapped handles\n * go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt\n * go#75116 os: Root.MkdirAll can return \u0027file exists\u0027 when called concurrently on the same path\n * go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75255 cmd/compile: export to DWARF types only referenced through interfaces\n * go#75347 testing/synctest: test timeout with no runnable goroutines\n * go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining\n * go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75537 context: Err can return non-nil before Done channel is closed\n * go#75539 net/http: internal error: connCount underflow\n * go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75669 runtime: debug.decoratemappings don\u0027t work as expected\n * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64\n * go#75777 spec: Go1.25 spec should be dated closer to actual release date\n * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS\n * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75952 encoding/pem: regression when decoding blocks with leading garbage\n * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied\n * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should\n * go#76029 pem/encoding: malformed line endings can cause panics\n * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25\n * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied, ReOpenFile error handling followup\n * go#76392 os: package initialization hangs is Stdin is blocked\n * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76776 runtime: race detector crash on ppc64le\n * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u003cfunction\u003e: runtime error: index out of range\n * go#76973 errors: errors.Join behavior changed in 1.25\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-298,SUSE-SLE-Module-Development-Tools-15-SP7-2026-298,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-298,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-298,openSUSE-SLE-15.6-2026-298",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0298-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0298-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260298-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0298-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1246118",
"url": "https://bugzilla.suse.com/1246118"
},
{
"category": "self",
"summary": "SUSE Bug 1247719",
"url": "https://bugzilla.suse.com/1247719"
},
{
"category": "self",
"summary": "SUSE Bug 1247720",
"url": "https://bugzilla.suse.com/1247720"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249141",
"url": "https://bugzilla.suse.com/1249141"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254227",
"url": "https://bugzilla.suse.com/1254227"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4674 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47906 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47907 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47910 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25-openssl",
"tracking": {
"current_release_date": "2026-01-26T16:11:04Z",
"generator": {
"date": "2026-01-26T16:11:04Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0298-1",
"initial_release_date": "2026-01-26T16:11:04Z",
"revision_history": [
{
"date": "2026-01-26T16:11:04Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"product": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"product_id": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.i586",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.i586",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.i586"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.i586",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.i586",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"product_id": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"product": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"product_id": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"product": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"product_id": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-4674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4674"
}
],
"notes": [
{
"category": "general",
"text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4674",
"url": "https://www.suse.com/security/cve/CVE-2025-4674"
},
{
"category": "external",
"summary": "SUSE Bug 1246118 for CVE-2025-4674",
"url": "https://bugzilla.suse.com/1246118"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-4674"
},
{
"cve": "CVE-2025-47906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47906"
}
],
"notes": [
{
"category": "general",
"text": "If the PATH environment variable contains paths which are executables (rather than just directories), passing certain strings to LookPath (\"\", \".\", and \"..\"), can result in the binaries listed in the PATH being unexpectedly returned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47906",
"url": "https://www.suse.com/security/cve/CVE-2025-47906"
},
{
"category": "external",
"summary": "SUSE Bug 1247719 for CVE-2025-47906",
"url": "https://bugzilla.suse.com/1247719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-47906"
},
{
"cve": "CVE-2025-47907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47907"
}
],
"notes": [
{
"category": "general",
"text": "Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the expected results with those of another query, causing the call to Scan to return either unexpected results from the other query or an error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47907",
"url": "https://www.suse.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "SUSE Bug 1247720 for CVE-2025-47907",
"url": "https://bugzilla.suse.com/1247720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-47907"
},
{
"cve": "CVE-2025-47910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47910"
}
],
"notes": [
{
"category": "general",
"text": "When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47910",
"url": "https://www.suse.com/security/cve/CVE-2025-47910"
},
{
"category": "external",
"summary": "SUSE Bug 1249141 for CVE-2025-47910",
"url": "https://bugzilla.suse.com/1249141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-47910"
},
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2025:21193-1
Vulnerability from csaf_suse - Published: 2025-12-12 07:45 - Updated: 2025-12-12 07:45Summary
Security update for go1.24
Notes
Title of the patch
Security update for go1.24
Description of the patch
This update for go1.24 fixes the following issues:
Update to go1.24.11.
Security issues fixed:
- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).
- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).
- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion
(bsc#1251258).
- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).
- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).
- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).
- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).
- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).
- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).
- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).
- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN (bsc#1254430).
- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation
(bsc#1254431).
Other issues fixed and changes:
- Version 1.24.11:
* go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364
cores
- Version 1.24.10:
* go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets
* go#75951 encoding/pem: regression when decoding blocks with leading garbage
* go#76028 pem/encoding: malformed line endings can cause panics
- Version 1.24.9:
* go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot
- Version 1.24.8:
* go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root
* go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21
* go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol
* go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9
* go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9
* go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail
* go#75538 net/http: internal error: connCount underflow
* go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn
* go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value
- Version 1.24.7:
* go#75007 os/exec: TestLookPath fails on plan9 after CL 685755
* go#74821 cmd/go: "get toolchain@latest" should ignore release candidates
* go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets
- Packaging: migrate from update-alternatives to libalternatives (bsc#1245878).
- Package svgpan.js to fix issues with "go tool pprof" (bsc#1249985).
- Drop unused gccgo bootstrap code in go1.22+ (bsc#1248082).
Patchnames
SUSE-SLES-16.0-103
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24 fixes the following issues:\n\nUpdate to go1.24.11.\n\nSecurity issues fixed:\n\n- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion\n (bsc#1251258).\n- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation\n (bsc#1254431).\n\n\nOther issues fixed and changes:\n\n- Version 1.24.11:\n * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364\n cores\n\n- Version 1.24.10:\n * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75951 encoding/pem: regression when decoding blocks with leading garbage\n * go#76028 pem/encoding: malformed line endings can cause panics\n\n- Version 1.24.9:\n * go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot\n\n- Version 1.24.8:\n * go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol\n * go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9\n * go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75538 net/http: internal error: connCount underflow\n * go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n\n- Version 1.24.7:\n * go#75007 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#74821 cmd/go: \"get toolchain@latest\" should ignore release candidates\n * go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n\n- Packaging: migrate from update-alternatives to libalternatives (bsc#1245878).\n- Package svgpan.js to fix issues with \"go tool pprof\" (bsc#1249985).\n- Drop unused gccgo bootstrap code in go1.22+ (bsc#1248082).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-103",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_21193-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:21193-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202521193-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:21193-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023548.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
}
],
"title": "Security update for go1.24",
"tracking": {
"current_release_date": "2025-12-12T07:45:36Z",
"generator": {
"date": "2025-12-12T07:45:36Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:21193-1",
"initial_release_date": "2025-12-12T07:45:36Z",
"revision_history": [
{
"date": "2025-12-12T07:45:36Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-160000.1.1.aarch64",
"product": {
"name": "go1.24-1.24.11-160000.1.1.aarch64",
"product_id": "go1.24-1.24.11-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-160000.1.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.11-160000.1.1.aarch64",
"product_id": "go1.24-doc-1.24.11-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.11-160000.1.1.aarch64",
"product": {
"name": "go1.24-libstd-1.24.11-160000.1.1.aarch64",
"product_id": "go1.24-libstd-1.24.11-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-160000.1.1.aarch64",
"product": {
"name": "go1.24-race-1.24.11-160000.1.1.aarch64",
"product_id": "go1.24-race-1.24.11-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-160000.1.1.ppc64le",
"product": {
"name": "go1.24-1.24.11-160000.1.1.ppc64le",
"product_id": "go1.24-1.24.11-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-160000.1.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.11-160000.1.1.ppc64le",
"product_id": "go1.24-doc-1.24.11-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-160000.1.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.11-160000.1.1.ppc64le",
"product_id": "go1.24-race-1.24.11-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-160000.1.1.s390x",
"product": {
"name": "go1.24-1.24.11-160000.1.1.s390x",
"product_id": "go1.24-1.24.11-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-160000.1.1.s390x",
"product": {
"name": "go1.24-doc-1.24.11-160000.1.1.s390x",
"product_id": "go1.24-doc-1.24.11-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-160000.1.1.s390x",
"product": {
"name": "go1.24-race-1.24.11-160000.1.1.s390x",
"product_id": "go1.24-race-1.24.11-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.11-160000.1.1.x86_64",
"product": {
"name": "go1.24-1.24.11-160000.1.1.x86_64",
"product_id": "go1.24-1.24.11-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.11-160000.1.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.11-160000.1.1.x86_64",
"product_id": "go1.24-doc-1.24.11-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.11-160000.1.1.x86_64",
"product": {
"name": "go1.24-libstd-1.24.11-160000.1.1.x86_64",
"product_id": "go1.24-libstd-1.24.11-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.11-160000.1.1.x86_64",
"product": {
"name": "go1.24-race-1.24.11-160000.1.1.x86_64",
"product_id": "go1.24-race-1.24.11-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x"
},
"product_reference": "go1.24-1.24.11-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.11-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.11-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le"
},
"product_reference": "go1.24-1.24.11-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x"
},
"product_reference": "go1.24-1.24.11-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.11-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.11-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.11-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.11-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.11-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.11-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T07:45:36Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
}
]
}
SUSE-SU-2026:0308-1
Vulnerability from csaf_suse - Published: 2026-01-28 08:38 - Updated: 2026-01-28 08:38Summary
Security update for go1.24-openssl
Notes
Title of the patch
Security update for go1.24-openssl
Description of the patch
This update for go1.24-openssl fixes the following issues:
Update to version 1.24.12 (released 2026-01-15) (jsc#SLE-18320, bsc#1236217):
Security fixes:
- CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).
- CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).
- CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).
- CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).
- CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).
- CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).
- CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).
- CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).
- CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).
- CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).
- CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).
- CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN (bsc#1254430).
- CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).
- CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).
- CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).
- CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).
- CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).
- CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).
Other fixes:
* go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets
* go#74821 cmd/go: 'get toolchain@latest' should ignore release candidates
* go#75007 os/exec: TestLookPath fails on plan9 after CL 685755
* go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root
* go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21
* go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol
* go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9
* go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9
* go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail
* go#75538 net/http: internal error: connCount underflow
* go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn
* go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value
* go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets
* go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot
* go#75951 encoding/pem: regression when decoding blocks with leading garbage
* go#76028 pem/encoding: malformed line endings can cause panics
* go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores
* go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled
* go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes
* go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386
* go#76796 runtime: race detector crash on ppc64le
* go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling <function>: runtime error: index out of range
Patchnames
SUSE-2026-308,SUSE-SLE-Module-Development-Tools-15-SP7-2026-308,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-308,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-308,openSUSE-SLE-15.6-2026-308
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24-openssl fixes the following issues:\n\nUpdate to version 1.24.12 (released 2026-01-15) (jsc#SLE-18320, bsc#1236217):\n\nSecurity fixes:\n\n - CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n - CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n - CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).\n - CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n - CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n - CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n - CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n - CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n - CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n - CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#74821 cmd/go: \u0027get toolchain@latest\u0027 should ignore release candidates\n * go#75007 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol\n * go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9\n * go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75538 net/http: internal error: connCount underflow\n * go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75951 encoding/pem: regression when decoding blocks with leading garbage\n * go#76028 pem/encoding: malformed line endings can cause panics\n * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores\n * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76796 runtime: race detector crash on ppc64le\n * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-308,SUSE-SLE-Module-Development-Tools-15-SP7-2026-308,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-308,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-308,openSUSE-SLE-15.6-2026-308",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0308-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0308-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0308-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24-openssl",
"tracking": {
"current_release_date": "2026-01-28T08:38:40Z",
"generator": {
"date": "2026-01-28T08:38:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0308-1",
"initial_release_date": "2026-01-28T08:38:40Z",
"revision_history": [
{
"date": "2026-01-28T08:38:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"product": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"product_id": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.i586",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.i586",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.i586"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.i586",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.i586",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"product": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"product_id": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"product": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"product_id": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"product": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"product_id": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
RHSA-2026:2138
Vulnerability from csaf_redhat - Published: 2026-02-05 15:35 - Updated: 2026-02-13 23:28Summary
Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release
Notes
Topic
The 1.3.2 release of Red Hat Trusted Artifact Signer OpenShift Operator.
For more details please visit the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3
Details
The RHTAS Operator can be used with OpenShift Container Platform 4.16, 4.17, 4.18, 4.19, and 4.20
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The 1.3.2 release of Red Hat Trusted Artifact Signer OpenShift Operator.\nFor more details please visit the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3",
"title": "Topic"
},
{
"category": "general",
"text": "The RHTAS Operator can be used with OpenShift Container Platform 4.16, 4.17, 4.18, 4.19, and 4.20",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2138",
"url": "https://access.redhat.com/errata/RHSA-2026:2138"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3",
"url": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2138.json"
}
],
"title": "Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release",
"tracking": {
"current_release_date": "2026-02-13T23:28:26+00:00",
"generator": {
"date": "2026-02-13T23:28:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2138",
"initial_release_date": "2026-02-05T15:35:02+00:00",
"revision_history": [
{
"date": "2026-02-05T15:35:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-05T15:35:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-13T23:28:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Trusted Artifact Signer 1.3",
"product": {
"name": "Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:trusted_artifact_signer:1.3::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Trusted Artifact Signer"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:f8fe656e4d4f8c2e801ebfa829770928520f411327eb3776b80d1012200933a2_amd64",
"product": {
"name": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:f8fe656e4d4f8c2e801ebfa829770928520f411327eb3776b80d1012200933a2_amd64",
"product_id": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:f8fe656e4d4f8c2e801ebfa829770928520f411327eb3776b80d1012200933a2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rekor-monitor-rhel9@sha256%3Af8fe656e4d4f8c2e801ebfa829770928520f411327eb3776b80d1012200933a2?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770110084"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:f8fe656e4d4f8c2e801ebfa829770928520f411327eb3776b80d1012200933a2_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:f8fe656e4d4f8c2e801ebfa829770928520f411327eb3776b80d1012200933a2_amd64"
},
"product_reference": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:f8fe656e4d4f8c2e801ebfa829770928520f411327eb3776b80d1012200933a2_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:f8fe656e4d4f8c2e801ebfa829770928520f411327eb3776b80d1012200933a2_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:35:02+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:f8fe656e4d4f8c2e801ebfa829770928520f411327eb3776b80d1012200933a2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2138"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:f8fe656e4d4f8c2e801ebfa829770928520f411327eb3776b80d1012200933a2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:1907
Vulnerability from csaf_redhat - Published: 2026-02-04 11:48 - Updated: 2026-02-13 23:28Summary
Red Hat Security Advisory: opentelemetry-collector security update
Notes
Topic
An update for opentelemetry-collector is now available for Red Hat Enterprise Linux 10.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Collector with the supported components for a Red Hat build of OpenTelemetry
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for opentelemetry-collector is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Collector with the supported components for a Red Hat build of OpenTelemetry\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1907",
"url": "https://access.redhat.com/errata/RHSA-2026:1907"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1907.json"
}
],
"title": "Red Hat Security Advisory: opentelemetry-collector security update",
"tracking": {
"current_release_date": "2026-02-13T23:28:20+00:00",
"generator": {
"date": "2026-02-13T23:28:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1907",
"initial_release_date": "2026-02-04T11:48:06+00:00",
"revision_history": [
{
"date": "2026-02-04T11:48:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-04T11:48:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-13T23:28:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.src",
"product": {
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.src",
"product_id": "opentelemetry-collector-0:0.135.0-3.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/opentelemetry-collector@0.135.0-3.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.aarch64",
"product": {
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.aarch64",
"product_id": "opentelemetry-collector-0:0.135.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/opentelemetry-collector@0.135.0-3.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.ppc64le",
"product": {
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.ppc64le",
"product_id": "opentelemetry-collector-0:0.135.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/opentelemetry-collector@0.135.0-3.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.s390x",
"product": {
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.s390x",
"product_id": "opentelemetry-collector-0:0.135.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/opentelemetry-collector@0.135.0-3.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.x86_64",
"product": {
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.x86_64",
"product_id": "opentelemetry-collector-0:0.135.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/opentelemetry-collector@0.135.0-3.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.aarch64"
},
"product_reference": "opentelemetry-collector-0:0.135.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.ppc64le"
},
"product_reference": "opentelemetry-collector-0:0.135.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.s390x"
},
"product_reference": "opentelemetry-collector-0:0.135.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.src"
},
"product_reference": "opentelemetry-collector-0:0.135.0-3.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "opentelemetry-collector-0:0.135.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.x86_64"
},
"product_reference": "opentelemetry-collector-0:0.135.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.aarch64",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.s390x",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.src",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T11:48:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.aarch64",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.s390x",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.src",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1907"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.aarch64",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.s390x",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.src",
"AppStream-10.1.Z:opentelemetry-collector-0:0.135.0-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2654
Vulnerability from csaf_redhat - Published: 2026-02-12 13:46 - Updated: 2026-02-13 23:28Summary
Red Hat Security Advisory: Release of components for Service Telemetry Framework 1.5.7
Notes
Topic
Release of components for the Service Telemetry Framework
Details
Service Telemetry Framework (STF) provides automated collection of measurements and data from remote clients, such as Red Hat OpenStack Platform or third-party nodes. STF then transmits the information to a centralized, receiving Red Hat OpenShift Container Platform deployment for storage, retrieval, and monitoring.
Security Fix: * Excessive resource consumption when printing error string for host certificate validation in crypto/x509 (CVE-2025-61729)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Release of components for the Service Telemetry Framework",
"title": "Topic"
},
{
"category": "general",
"text": "Service Telemetry Framework (STF) provides automated collection of measurements and data from remote clients, such as Red Hat OpenStack Platform or third-party nodes. STF then transmits the information to a centralized, receiving Red Hat OpenShift Container Platform deployment for storage, retrieval, and monitoring.\nSecurity Fix: * Excessive resource consumption when printing error string for host certificate validation in crypto/x509 (CVE-2025-61729)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2654",
"url": "https://access.redhat.com/errata/RHSA-2026:2654"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://catalog.redhat.com/software/containers/search",
"url": "https://catalog.redhat.com/software/containers/search"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2654.json"
}
],
"title": "Red Hat Security Advisory: Release of components for Service Telemetry Framework 1.5.7",
"tracking": {
"current_release_date": "2026-02-13T23:28:36+00:00",
"generator": {
"date": "2026-02-13T23:28:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2654",
"initial_release_date": "2026-02-12T13:46:10+00:00",
"revision_history": [
{
"date": "2026-02-12T13:46:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-12T13:46:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-13T23:28:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Service Telemetry Framework 1.5",
"product": {
"name": "Service Telemetry Framework 1.5",
"product_id": "Service Telemetry Framework 1.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:stf:1.5::el9"
}
}
}
],
"category": "product_family",
"name": "Service Telemetry Framework"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/stf/prometheus-webhook-snmp-rhel9@sha256:17f2037309f59212739ab5594d9493cd50f7530c5fd9447ce14a8230bf234c23_amd64",
"product": {
"name": "registry.redhat.io/stf/prometheus-webhook-snmp-rhel9@sha256:17f2037309f59212739ab5594d9493cd50f7530c5fd9447ce14a8230bf234c23_amd64",
"product_id": "registry.redhat.io/stf/prometheus-webhook-snmp-rhel9@sha256:17f2037309f59212739ab5594d9493cd50f7530c5fd9447ce14a8230bf234c23_amd64",
"product_identification_helper": {
"purl": "pkg:oci/prometheus-webhook-snmp-rhel9@sha256%3A17f2037309f59212739ab5594d9493cd50f7530c5fd9447ce14a8230bf234c23?arch=amd64\u0026repository_url=registry.redhat.io/stf\u0026tag=1769588403"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/stf/service-telemetry-operator-bundle@sha256:a5e1a4b1e99e37c79f66dbc3cb47b4da122d286dfbf68810ef302fce1a0a85dd_amd64",
"product": {
"name": "registry.redhat.io/stf/service-telemetry-operator-bundle@sha256:a5e1a4b1e99e37c79f66dbc3cb47b4da122d286dfbf68810ef302fce1a0a85dd_amd64",
"product_id": "registry.redhat.io/stf/service-telemetry-operator-bundle@sha256:a5e1a4b1e99e37c79f66dbc3cb47b4da122d286dfbf68810ef302fce1a0a85dd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/service-telemetry-operator-bundle@sha256%3Aa5e1a4b1e99e37c79f66dbc3cb47b4da122d286dfbf68810ef302fce1a0a85dd?arch=amd64\u0026repository_url=registry.redhat.io/stf\u0026tag=1769588965"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/stf/service-telemetry-rhel9-operator@sha256:5f4fa94bcf80d8d324dad745914b31345021156f9d5491bf5441b1158f6ff486_amd64",
"product": {
"name": "registry.redhat.io/stf/service-telemetry-rhel9-operator@sha256:5f4fa94bcf80d8d324dad745914b31345021156f9d5491bf5441b1158f6ff486_amd64",
"product_id": "registry.redhat.io/stf/service-telemetry-rhel9-operator@sha256:5f4fa94bcf80d8d324dad745914b31345021156f9d5491bf5441b1158f6ff486_amd64",
"product_identification_helper": {
"purl": "pkg:oci/service-telemetry-rhel9-operator@sha256%3A5f4fa94bcf80d8d324dad745914b31345021156f9d5491bf5441b1158f6ff486?arch=amd64\u0026repository_url=registry.redhat.io/stf\u0026tag=1769588319"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/stf/sg-bridge-rhel9@sha256:adbab70b99404ac31e80888af2f7742f78f03235eff0719c95bff21048d0f05c_amd64",
"product": {
"name": "registry.redhat.io/stf/sg-bridge-rhel9@sha256:adbab70b99404ac31e80888af2f7742f78f03235eff0719c95bff21048d0f05c_amd64",
"product_id": "registry.redhat.io/stf/sg-bridge-rhel9@sha256:adbab70b99404ac31e80888af2f7742f78f03235eff0719c95bff21048d0f05c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/sg-bridge-rhel9@sha256%3Aadbab70b99404ac31e80888af2f7742f78f03235eff0719c95bff21048d0f05c?arch=amd64\u0026repository_url=registry.redhat.io/stf\u0026tag=1769588321"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/stf/sg-core-rhel9@sha256:c8e3a280152562a735e38f09612e59954728549ec7238240aaf8750f68dc8ed8_amd64",
"product": {
"name": "registry.redhat.io/stf/sg-core-rhel9@sha256:c8e3a280152562a735e38f09612e59954728549ec7238240aaf8750f68dc8ed8_amd64",
"product_id": "registry.redhat.io/stf/sg-core-rhel9@sha256:c8e3a280152562a735e38f09612e59954728549ec7238240aaf8750f68dc8ed8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/sg-core-rhel9@sha256%3Ac8e3a280152562a735e38f09612e59954728549ec7238240aaf8750f68dc8ed8?arch=amd64\u0026repository_url=registry.redhat.io/stf\u0026tag=1769591175"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/stf/smart-gateway-operator-bundle@sha256:03a0cb40992e36a33327cf6851d1bb92177f5a7425e103121734874fd71ea55d_amd64",
"product": {
"name": "registry.redhat.io/stf/smart-gateway-operator-bundle@sha256:03a0cb40992e36a33327cf6851d1bb92177f5a7425e103121734874fd71ea55d_amd64",
"product_id": "registry.redhat.io/stf/smart-gateway-operator-bundle@sha256:03a0cb40992e36a33327cf6851d1bb92177f5a7425e103121734874fd71ea55d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/smart-gateway-operator-bundle@sha256%3A03a0cb40992e36a33327cf6851d1bb92177f5a7425e103121734874fd71ea55d?arch=amd64\u0026repository_url=registry.redhat.io/stf\u0026tag=1769592016"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/stf/smart-gateway-rhel9-operator@sha256:5b79414c3a506cb562242d926404790bfb94e953fe1b051db0ecc3892117d34f_amd64",
"product": {
"name": "registry.redhat.io/stf/smart-gateway-rhel9-operator@sha256:5b79414c3a506cb562242d926404790bfb94e953fe1b051db0ecc3892117d34f_amd64",
"product_id": "registry.redhat.io/stf/smart-gateway-rhel9-operator@sha256:5b79414c3a506cb562242d926404790bfb94e953fe1b051db0ecc3892117d34f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/smart-gateway-rhel9-operator@sha256%3A5b79414c3a506cb562242d926404790bfb94e953fe1b051db0ecc3892117d34f?arch=amd64\u0026repository_url=registry.redhat.io/stf\u0026tag=1769588363"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/stf/prometheus-webhook-snmp-rhel9@sha256:17f2037309f59212739ab5594d9493cd50f7530c5fd9447ce14a8230bf234c23_amd64 as a component of Service Telemetry Framework 1.5",
"product_id": "Service Telemetry Framework 1.5:registry.redhat.io/stf/prometheus-webhook-snmp-rhel9@sha256:17f2037309f59212739ab5594d9493cd50f7530c5fd9447ce14a8230bf234c23_amd64"
},
"product_reference": "registry.redhat.io/stf/prometheus-webhook-snmp-rhel9@sha256:17f2037309f59212739ab5594d9493cd50f7530c5fd9447ce14a8230bf234c23_amd64",
"relates_to_product_reference": "Service Telemetry Framework 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/stf/service-telemetry-operator-bundle@sha256:a5e1a4b1e99e37c79f66dbc3cb47b4da122d286dfbf68810ef302fce1a0a85dd_amd64 as a component of Service Telemetry Framework 1.5",
"product_id": "Service Telemetry Framework 1.5:registry.redhat.io/stf/service-telemetry-operator-bundle@sha256:a5e1a4b1e99e37c79f66dbc3cb47b4da122d286dfbf68810ef302fce1a0a85dd_amd64"
},
"product_reference": "registry.redhat.io/stf/service-telemetry-operator-bundle@sha256:a5e1a4b1e99e37c79f66dbc3cb47b4da122d286dfbf68810ef302fce1a0a85dd_amd64",
"relates_to_product_reference": "Service Telemetry Framework 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/stf/service-telemetry-rhel9-operator@sha256:5f4fa94bcf80d8d324dad745914b31345021156f9d5491bf5441b1158f6ff486_amd64 as a component of Service Telemetry Framework 1.5",
"product_id": "Service Telemetry Framework 1.5:registry.redhat.io/stf/service-telemetry-rhel9-operator@sha256:5f4fa94bcf80d8d324dad745914b31345021156f9d5491bf5441b1158f6ff486_amd64"
},
"product_reference": "registry.redhat.io/stf/service-telemetry-rhel9-operator@sha256:5f4fa94bcf80d8d324dad745914b31345021156f9d5491bf5441b1158f6ff486_amd64",
"relates_to_product_reference": "Service Telemetry Framework 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/stf/sg-bridge-rhel9@sha256:adbab70b99404ac31e80888af2f7742f78f03235eff0719c95bff21048d0f05c_amd64 as a component of Service Telemetry Framework 1.5",
"product_id": "Service Telemetry Framework 1.5:registry.redhat.io/stf/sg-bridge-rhel9@sha256:adbab70b99404ac31e80888af2f7742f78f03235eff0719c95bff21048d0f05c_amd64"
},
"product_reference": "registry.redhat.io/stf/sg-bridge-rhel9@sha256:adbab70b99404ac31e80888af2f7742f78f03235eff0719c95bff21048d0f05c_amd64",
"relates_to_product_reference": "Service Telemetry Framework 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/stf/sg-core-rhel9@sha256:c8e3a280152562a735e38f09612e59954728549ec7238240aaf8750f68dc8ed8_amd64 as a component of Service Telemetry Framework 1.5",
"product_id": "Service Telemetry Framework 1.5:registry.redhat.io/stf/sg-core-rhel9@sha256:c8e3a280152562a735e38f09612e59954728549ec7238240aaf8750f68dc8ed8_amd64"
},
"product_reference": "registry.redhat.io/stf/sg-core-rhel9@sha256:c8e3a280152562a735e38f09612e59954728549ec7238240aaf8750f68dc8ed8_amd64",
"relates_to_product_reference": "Service Telemetry Framework 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/stf/smart-gateway-operator-bundle@sha256:03a0cb40992e36a33327cf6851d1bb92177f5a7425e103121734874fd71ea55d_amd64 as a component of Service Telemetry Framework 1.5",
"product_id": "Service Telemetry Framework 1.5:registry.redhat.io/stf/smart-gateway-operator-bundle@sha256:03a0cb40992e36a33327cf6851d1bb92177f5a7425e103121734874fd71ea55d_amd64"
},
"product_reference": "registry.redhat.io/stf/smart-gateway-operator-bundle@sha256:03a0cb40992e36a33327cf6851d1bb92177f5a7425e103121734874fd71ea55d_amd64",
"relates_to_product_reference": "Service Telemetry Framework 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/stf/smart-gateway-rhel9-operator@sha256:5b79414c3a506cb562242d926404790bfb94e953fe1b051db0ecc3892117d34f_amd64 as a component of Service Telemetry Framework 1.5",
"product_id": "Service Telemetry Framework 1.5:registry.redhat.io/stf/smart-gateway-rhel9-operator@sha256:5b79414c3a506cb562242d926404790bfb94e953fe1b051db0ecc3892117d34f_amd64"
},
"product_reference": "registry.redhat.io/stf/smart-gateway-rhel9-operator@sha256:5b79414c3a506cb562242d926404790bfb94e953fe1b051db0ecc3892117d34f_amd64",
"relates_to_product_reference": "Service Telemetry Framework 1.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Service Telemetry Framework 1.5:registry.redhat.io/stf/prometheus-webhook-snmp-rhel9@sha256:17f2037309f59212739ab5594d9493cd50f7530c5fd9447ce14a8230bf234c23_amd64",
"Service Telemetry Framework 1.5:registry.redhat.io/stf/service-telemetry-operator-bundle@sha256:a5e1a4b1e99e37c79f66dbc3cb47b4da122d286dfbf68810ef302fce1a0a85dd_amd64",
"Service Telemetry Framework 1.5:registry.redhat.io/stf/service-telemetry-rhel9-operator@sha256:5f4fa94bcf80d8d324dad745914b31345021156f9d5491bf5441b1158f6ff486_amd64",
"Service Telemetry Framework 1.5:registry.redhat.io/stf/sg-bridge-rhel9@sha256:adbab70b99404ac31e80888af2f7742f78f03235eff0719c95bff21048d0f05c_amd64",
"Service Telemetry Framework 1.5:registry.redhat.io/stf/smart-gateway-operator-bundle@sha256:03a0cb40992e36a33327cf6851d1bb92177f5a7425e103121734874fd71ea55d_amd64",
"Service Telemetry Framework 1.5:registry.redhat.io/stf/smart-gateway-rhel9-operator@sha256:5b79414c3a506cb562242d926404790bfb94e953fe1b051db0ecc3892117d34f_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Service Telemetry Framework 1.5:registry.redhat.io/stf/sg-core-rhel9@sha256:c8e3a280152562a735e38f09612e59954728549ec7238240aaf8750f68dc8ed8_amd64"
],
"known_not_affected": [
"Service Telemetry Framework 1.5:registry.redhat.io/stf/prometheus-webhook-snmp-rhel9@sha256:17f2037309f59212739ab5594d9493cd50f7530c5fd9447ce14a8230bf234c23_amd64",
"Service Telemetry Framework 1.5:registry.redhat.io/stf/service-telemetry-operator-bundle@sha256:a5e1a4b1e99e37c79f66dbc3cb47b4da122d286dfbf68810ef302fce1a0a85dd_amd64",
"Service Telemetry Framework 1.5:registry.redhat.io/stf/service-telemetry-rhel9-operator@sha256:5f4fa94bcf80d8d324dad745914b31345021156f9d5491bf5441b1158f6ff486_amd64",
"Service Telemetry Framework 1.5:registry.redhat.io/stf/sg-bridge-rhel9@sha256:adbab70b99404ac31e80888af2f7742f78f03235eff0719c95bff21048d0f05c_amd64",
"Service Telemetry Framework 1.5:registry.redhat.io/stf/smart-gateway-operator-bundle@sha256:03a0cb40992e36a33327cf6851d1bb92177f5a7425e103121734874fd71ea55d_amd64",
"Service Telemetry Framework 1.5:registry.redhat.io/stf/smart-gateway-rhel9-operator@sha256:5b79414c3a506cb562242d926404790bfb94e953fe1b051db0ecc3892117d34f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T13:46:10+00:00",
"details": "The Service Telemetry Framework container image provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.",
"product_ids": [
"Service Telemetry Framework 1.5:registry.redhat.io/stf/sg-core-rhel9@sha256:c8e3a280152562a735e38f09612e59954728549ec7238240aaf8750f68dc8ed8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2654"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Service Telemetry Framework 1.5:registry.redhat.io/stf/prometheus-webhook-snmp-rhel9@sha256:17f2037309f59212739ab5594d9493cd50f7530c5fd9447ce14a8230bf234c23_amd64",
"Service Telemetry Framework 1.5:registry.redhat.io/stf/service-telemetry-operator-bundle@sha256:a5e1a4b1e99e37c79f66dbc3cb47b4da122d286dfbf68810ef302fce1a0a85dd_amd64",
"Service Telemetry Framework 1.5:registry.redhat.io/stf/service-telemetry-rhel9-operator@sha256:5f4fa94bcf80d8d324dad745914b31345021156f9d5491bf5441b1158f6ff486_amd64",
"Service Telemetry Framework 1.5:registry.redhat.io/stf/sg-bridge-rhel9@sha256:adbab70b99404ac31e80888af2f7742f78f03235eff0719c95bff21048d0f05c_amd64",
"Service Telemetry Framework 1.5:registry.redhat.io/stf/sg-core-rhel9@sha256:c8e3a280152562a735e38f09612e59954728549ec7238240aaf8750f68dc8ed8_amd64",
"Service Telemetry Framework 1.5:registry.redhat.io/stf/smart-gateway-operator-bundle@sha256:03a0cb40992e36a33327cf6851d1bb92177f5a7425e103121734874fd71ea55d_amd64",
"Service Telemetry Framework 1.5:registry.redhat.io/stf/smart-gateway-rhel9-operator@sha256:5b79414c3a506cb562242d926404790bfb94e953fe1b051db0ecc3892117d34f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:1942
Vulnerability from csaf_redhat - Published: 2026-02-04 15:43 - Updated: 2026-02-14 13:27Summary
Red Hat Security Advisory: Red Hat Quay 3.15.3
Notes
Topic
Red Hat Quay 3.15.3 is now available with bug fixes.
Details
Quay 3.15.3
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Quay 3.15.3 is now available with bug fixes.",
"title": "Topic"
},
{
"category": "general",
"text": "Quay 3.15.3",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1942",
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-34156",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-12816",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15284",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47907",
"url": "https://access.redhat.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47913",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-52881",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58183",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58754",
"url": "https://access.redhat.com/security/cve/CVE-2025-58754"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-59420",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-65945",
"url": "https://access.redhat.com/security/cve/CVE-2025-65945"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66506",
"url": "https://access.redhat.com/security/cve/CVE-2025-66506"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-21441",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-24049",
"url": "https://access.redhat.com/security/cve/CVE-2026-24049"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1942.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Quay 3.15.3",
"tracking": {
"current_release_date": "2026-02-14T13:27:09+00:00",
"generator": {
"date": "2026-02-14T13:27:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1942",
"initial_release_date": "2026-02-04T15:43:51+00:00",
"revision_history": [
{
"date": "2026-02-04T15:43:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-04T15:44:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-14T13:27:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Quay 3.15",
"product": {
"name": "Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:quay:3.15::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Quay"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-bundle@sha256%3A1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770135404"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134320"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-bundle@sha256%3A547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770135436"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134351"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3Ab33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770146612"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3Ae657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770146190"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3Ac0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134397"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-bundle@sha256%3A197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770149618"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3Ae51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134436"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3Aa8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770146565"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134320"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134351"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770146190"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3Afb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134397"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134436"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770146565"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134320"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Af57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134351"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770146190"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134397"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134436"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770146565"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-34156",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2024-09-06T21:20:09.377905+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2310528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Go\u0027s `encoding/gob` package is of high severity because it exposes applications to potential Denial of Service (DoS) attacks through stack exhaustion. Since `gob` relies on recursive function calls to decode nested structures, an attacker could exploit this by sending crafted messages with excessively deep nesting, causing the application to panic due to stack overflow. This risk is particularly important in scenarios where untrusted or external input is processed, as it can lead to system unavailability or crashes, undermining the reliability and availability of services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "RHBZ#2310528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://go.dev/cl/611239",
"url": "https://go.dev/cl/611239"
},
{
"category": "external",
"summary": "https://go.dev/issue/69139",
"url": "https://go.dev/issue/69139"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk",
"url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3106",
"url": "https://pkg.go.dev/vuln/GO-2024-3106"
}
],
"release_date": "2024-09-06T21:15:12.020000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion"
},
{
"cve": "CVE-2025-12816",
"cwe": {
"id": "CWE-179",
"name": "Incorrect Behavior Order: Early Validation"
},
"discovery_date": "2025-11-25T20:01:05.875196+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2417097"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in node-forge. This vulnerability allows unauthenticated attackers to bypass downstream cryptographic verifications and security decisions via crafting ASN.1 (Abstract Syntax Notation One) structures to desynchronize schema validations, yielding a semantic divergence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products due to an interpretation conflict in the node-forge library. An unauthenticated attacker could exploit this flaw by crafting malicious ASN.1 structures, leading to a bypass of cryptographic verifications and security decisions in affected applications. This impacts various Red Hat products that utilize node-forge for cryptographic operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "RHBZ#2417097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417097"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge",
"url": "https://github.com/digitalbazaar/forge"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/pull/1124",
"url": "https://github.com/digitalbazaar/forge/pull/1124"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/521113",
"url": "https://kb.cert.org/vuls/id/521113"
},
{
"category": "external",
"summary": "https://www.npmjs.com/package/node-forge",
"url": "https://www.npmjs.com/package/node-forge"
}
],
"release_date": "2025-11-25T19:15:50.243000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications"
},
{
"cve": "CVE-2025-15284",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-29T23:00:58.541337+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2425946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in qs, a module used for parsing query strings. A remote attacker can exploit an improper input validation vulnerability by sending specially crafted HTTP requests that use bracket notation (e.g., `a[]=value`). This bypasses the `arrayLimit` option, which is designed to limit the size of parsed arrays and prevent resource exhaustion. Successful exploitation can lead to memory exhaustion, causing a Denial of Service (DoS) where the application crashes or becomes unresponsive, making the service unavailable to users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "qs: qs: Denial of Service via improper input validation in array parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products that utilize the `qs` module for parsing query strings, particularly when processing user-controlled input with bracket notation. The `arrayLimit` option, intended to prevent resource exhaustion, is bypassed when bracket notation (`a[]=value`) is used, allowing a remote attacker to cause a denial of service through memory exhaustion. This can lead to application crashes or unresponsiveness, making the service unavailable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "RHBZ#2425946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9",
"url": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p",
"url": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p"
}
],
"release_date": "2025-12-29T22:56:45.240000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "qs: qs: Denial of Service via improper input validation in array parsing"
},
{
"cve": "CVE-2025-47907",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2025-08-07T16:01:06.247481+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2387083"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in database/sql. Concurrent queries can produce unexpected results when a query is cancelled during a Scan method call on returned Rows, creating a race condition. This vulnerability allows an attacker who can initiate and cancel queries to trigger this condition, possibly leading to inconsistent data being returned to the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "database/sql: Postgres Scan Race Condition",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability marked as Moderate severity issues rather than Important. The os/exec LookPath flaw requires a misconfigured PATH to be exploitable, and the database/sql race condition primarily impacts applications that cancel queries while running multiple queries concurrently. Both can cause unexpected behavior, but the exploitation scope is limited and unlikely to result in direct compromise in most typical deployments.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "RHBZ#2387083",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387083"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47907",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47907"
},
{
"category": "external",
"summary": "https://go.dev/cl/693735",
"url": "https://go.dev/cl/693735"
},
{
"category": "external",
"summary": "https://go.dev/issue/74831",
"url": "https://go.dev/issue/74831"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x5MKroML2yM",
"url": "https://groups.google.com/g/golang-announce/c/x5MKroML2yM"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-3849",
"url": "https://pkg.go.dev/vuln/GO-2025-3849"
}
],
"release_date": "2025-08-07T15:25:30.704000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "database/sql: Postgres Scan Race Condition"
},
{
"cve": "CVE-2025-47913",
"discovery_date": "2025-11-13T22:01:26.092452+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414943"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic(\"unreachable\") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling\u2014or intercepting\u2014SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into \u201cunreachable\u201d code paths instead of being handled gracefully\u2014making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "RHBZ#2414943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hcg3-q754-cr77",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"category": "external",
"summary": "https://go.dev/cl/700295",
"url": "https://go.dev/cl/700295"
},
{
"category": "external",
"summary": "https://go.dev/issue/75178",
"url": "https://go.dev/issue/75178"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4116",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"release_date": "2025-11-13T21:29:39.907000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS"
},
{
"cve": "CVE-2025-52881",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2025-10-17T14:19:18.652000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2404715"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in runc. This attack is a more sophisticated variant of CVE-2019-16884, which was a flaw that allowed an attacker to trick runc into writing the LSM process labels for a container process into a dummy tmpfs file and thus not apply the correct LSM labels to the container process. The mitigation applied for CVE-2019-16884 was fairly limited and effectively only caused runc to verify that when we write LSM labels that those labels are actual procfs files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat considers this as an Important flaw since the impact is limited to local attack with minimal privileges in order to jeopardize the environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "RHBZ#2404715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404715"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://github.com/opencontainers/selinux/pull/237",
"url": "https://github.com/opencontainers/selinux/pull/237"
}
],
"release_date": "2025-11-05T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Potential mitigations for this issue include:\n\n* Using rootless containers, as doing so will block most of the inadvertent writes (runc would run with reduced privileges, making attempts to write to procfs files ineffective).\n* Based on our analysis, neither AppArmor or SELinux can protect against the full version of the redirected write attack. The container runtime is generally privileged enough to write to arbitrary procfs files, which is more than sufficient to cause a container breakout.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects"
},
{
"cve": "CVE-2025-58183",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-29T23:01:50.573951+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2407258"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to be able to process a specially crafted GNU tar pax 1.0 archive with the application using the archive/tar package. Additionally, this issue can cause the Go application to allocate a large amount of memory, eventually leading to an out-of-memory condition and resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "RHBZ#2407258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2407258"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://go.dev/cl/709861",
"url": "https://go.dev/cl/709861"
},
{
"category": "external",
"summary": "https://go.dev/issue/75677",
"url": "https://go.dev/issue/75677"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI",
"url": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4014",
"url": "https://pkg.go.dev/vuln/GO-2025-4014"
}
],
"release_date": "2025-10-29T22:10:14.376000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map"
},
{
"cve": "CVE-2025-58754",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-09-12T02:00:53.897605+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2394735"
}
],
"notes": [
{
"category": "description",
"text": "Axios is a promise based HTTP client for the browser and Node.js. When Axios starting in version 0.28.0 and prior to versions 0.30.2 and 1.12.0 runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response. This path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested `responseType: \u0027stream\u0027`. Versions 0.30.2 and 1.12.0 contain a patch for the issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "axios: Axios DoS via lack of data size check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Availability impact is limited to the application which bundles axios and not the host Red Hat system.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58754"
},
{
"category": "external",
"summary": "RHBZ#2394735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394735"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58754"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593",
"url": "https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/pull/7011",
"url": "https://github.com/axios/axios/pull/7011"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/releases/tag/v1.12.0",
"url": "https://github.com/axios/axios/releases/tag/v1.12.0"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj",
"url": "https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj"
}
],
"release_date": "2025-09-12T01:16:40.513000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "axios: Axios DoS via lack of data size check"
},
{
"cve": "CVE-2025-59420",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"discovery_date": "2025-09-22T18:01:35.379361+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2397460"
}
],
"notes": [
{
"category": "description",
"text": "Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.4, Authlib\u2019s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 \u201cmust\u2011understand\u201d semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed\u2011language fleets, this enables split\u2011brain verification and can lead to policy bypass, replay, or privilege escalation. This issue has been patched in version 1.6.4.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib RFC violation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "RHBZ#2397460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397460"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df",
"url": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32"
}
],
"release_date": "2025-09-22T17:28:53.869000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib RFC violation"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-65945",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"discovery_date": "2025-12-04T19:01:14.733682+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418904"
}
],
"notes": [
{
"category": "description",
"text": "auth0/node-jws is a JSON Web Signature implementation for Node.js. In versions 3.2.2 and earlier and version 4.0.0, auth0/node-jws has an improper signature verification vulnerability when using the HS256 algorithm under specific conditions. Applications are affected when they use the jws.createVerify() function for HMAC algorithms and use user-provided data from the JSON Web Signature protected header or payload in HMAC secret lookup routines, which can allow attackers to bypass signature verification. This issue has been patched in versions 3.2.3 and 4.0.1.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-jws: auth0/node-jws: Improper signature verification in HS256 algorithm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-65945"
},
{
"category": "external",
"summary": "RHBZ#2418904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418904"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-65945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-65945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65945"
},
{
"category": "external",
"summary": "https://github.com/auth0/node-jws/commit/34c45b2c04434f925b638de6a061de9339c0ea2e",
"url": "https://github.com/auth0/node-jws/commit/34c45b2c04434f925b638de6a061de9339c0ea2e"
},
{
"category": "external",
"summary": "https://github.com/auth0/node-jws/security/advisories/GHSA-869p-cjfg-cm3x",
"url": "https://github.com/auth0/node-jws/security/advisories/GHSA-869p-cjfg-cm3x"
}
],
"release_date": "2025-12-04T18:45:37.517000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-jws: auth0/node-jws: Improper signature verification in HS256 algorithm"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2025-66506",
"cwe": {
"id": "CWE-405",
"name": "Asymmetric Resource Consumption (Amplification)"
},
"discovery_date": "2025-12-04T23:01:20.507333+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419056"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Fulcio, a free-to-use certificate authority. This vulnerability allows a denial of service (DoS) due to excessive memory allocation when processing a malicious OpenID Connect (OIDC) identity token containing numerous period characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/sigstore/fulcio: Fulcio: Denial of Service via crafted OpenID Connect (OIDC) token",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat as Fulcio, a certificate authority used for issuing code signing certificates, is susceptible to a denial of service when processing a specially crafted OpenID Connect (OIDC) token. This could lead to resource exhaustion and service unavailability in affected Red Hat products that utilize Fulcio.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66506"
},
{
"category": "external",
"summary": "RHBZ#2419056",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419056"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66506"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/commit/765a0e57608b9ef390e1eeeea8595b9054c63a5a",
"url": "https://github.com/sigstore/fulcio/commit/765a0e57608b9ef390e1eeeea8595b9054c63a5a"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/security/advisories/GHSA-f83f-xpx7-ffpw",
"url": "https://github.com/sigstore/fulcio/security/advisories/GHSA-f83f-xpx7-ffpw"
}
],
"release_date": "2025-12-04T22:04:41.637000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/sigstore/fulcio: Fulcio: Denial of Service via crafted OpenID Connect (OIDC) token"
},
{
"cve": "CVE-2026-21441",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-01-07T23:01:59.422078+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427726"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is an HTTP client library for Python. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "RHBZ#2427726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b",
"url": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"
}
],
"release_date": "2026-01-07T22:09:01.936000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)"
},
{
"cve": "CVE-2026-24049",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-01-22T05:00:54.709179+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431959"
}
],
"notes": [
{
"category": "description",
"text": "wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.40.0 through 0.46.1, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wheel: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-24049"
},
{
"category": "external",
"summary": "RHBZ#2431959",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431959"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-24049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24049"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-24049",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24049"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/commit/7a7d2de96b22a9adf9208afcc9547e1001569fef",
"url": "https://github.com/pypa/wheel/commit/7a7d2de96b22a9adf9208afcc9547e1001569fef"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/releases/tag/0.46.2",
"url": "https://github.com/pypa/wheel/releases/tag/0.46.2"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx",
"url": "https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx"
}
],
"release_date": "2026-01-22T04:02:08.706000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "wheel: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking"
}
]
}
RHSA-2026:2371
Vulnerability from csaf_redhat - Published: 2026-02-09 20:49 - Updated: 2026-02-13 23:28Summary
Red Hat Security Advisory: Red Hat Web Terminal Operator 1.12.1 release.
Notes
Topic
Red Hat Web Terminal Operator 1.12.1 has been released.
Details
The Web Terminal provides a way to access a fully in-browser terminal emulator within the OpenShift Console. Command-line tools for interacting with the OpenShift cluster are pre-installed.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Web Terminal Operator 1.12.1 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "The Web Terminal provides a way to access a fully in-browser terminal emulator within the OpenShift Console. Command-line tools for interacting with the OpenShift cluster are pre-installed.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2371",
"url": "https://access.redhat.com/errata/RHSA-2026:2371"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2371.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Web Terminal Operator 1.12.1 release.",
"tracking": {
"current_release_date": "2026-02-13T23:28:33+00:00",
"generator": {
"date": "2026-02-13T23:28:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2371",
"initial_release_date": "2026-02-09T20:49:08+00:00",
"revision_history": [
{
"date": "2026-02-09T20:49:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T20:49:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-13T23:28:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Web Terminal 1.12",
"product": {
"name": "Red Hat Web Terminal 1.12",
"product_id": "Red Hat Web Terminal 1.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:webterminal:1.12::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Web Terminal"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:47611b41d24a5d1382f279b46895ff6aaa12c39049f02c080fa464660ea0704b_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:47611b41d24a5d1382f279b46895ff6aaa12c39049f02c080fa464660ea0704b_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:47611b41d24a5d1382f279b46895ff6aaa12c39049f02c080fa464660ea0704b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-exec-rhel9@sha256%3A47611b41d24a5d1382f279b46895ff6aaa12c39049f02c080fa464660ea0704b?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770667927"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:9a25718e20cc0f33082f4346cbfb63d71cb77c5c08bbcc4021ffa4552a4df16b_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:9a25718e20cc0f33082f4346cbfb63d71cb77c5c08bbcc4021ffa4552a4df16b_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:9a25718e20cc0f33082f4346cbfb63d71cb77c5c08bbcc4021ffa4552a4df16b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-rhel9-operator@sha256%3A9a25718e20cc0f33082f4346cbfb63d71cb77c5c08bbcc4021ffa4552a4df16b?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770667927"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:a16c875367810b15a5aa0da2c128d20f295866a5dab65f93deeaa78621b6135c_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:a16c875367810b15a5aa0da2c128d20f295866a5dab65f93deeaa78621b6135c_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:a16c875367810b15a5aa0da2c128d20f295866a5dab65f93deeaa78621b6135c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-operator-bundle@sha256%3Aa16c875367810b15a5aa0da2c128d20f295866a5dab65f93deeaa78621b6135c?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770667885"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:335c03975dd985354a57ac13f184918157de6e1cf0f0003127d01cf90467c3c2_amd64",
"product": {
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:335c03975dd985354a57ac13f184918157de6e1cf0f0003127d01cf90467c3c2_amd64",
"product_id": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:335c03975dd985354a57ac13f184918157de6e1cf0f0003127d01cf90467c3c2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-tooling-rhel9@sha256%3A335c03975dd985354a57ac13f184918157de6e1cf0f0003127d01cf90467c3c2?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal\u0026tag=1770667946"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:47611b41d24a5d1382f279b46895ff6aaa12c39049f02c080fa464660ea0704b_amd64 as a component of Red Hat Web Terminal 1.12",
"product_id": "Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:47611b41d24a5d1382f279b46895ff6aaa12c39049f02c080fa464660ea0704b_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:47611b41d24a5d1382f279b46895ff6aaa12c39049f02c080fa464660ea0704b_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:a16c875367810b15a5aa0da2c128d20f295866a5dab65f93deeaa78621b6135c_amd64 as a component of Red Hat Web Terminal 1.12",
"product_id": "Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:a16c875367810b15a5aa0da2c128d20f295866a5dab65f93deeaa78621b6135c_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:a16c875367810b15a5aa0da2c128d20f295866a5dab65f93deeaa78621b6135c_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:9a25718e20cc0f33082f4346cbfb63d71cb77c5c08bbcc4021ffa4552a4df16b_amd64 as a component of Red Hat Web Terminal 1.12",
"product_id": "Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:9a25718e20cc0f33082f4346cbfb63d71cb77c5c08bbcc4021ffa4552a4df16b_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:9a25718e20cc0f33082f4346cbfb63d71cb77c5c08bbcc4021ffa4552a4df16b_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:335c03975dd985354a57ac13f184918157de6e1cf0f0003127d01cf90467c3c2_amd64 as a component of Red Hat Web Terminal 1.12",
"product_id": "Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:335c03975dd985354a57ac13f184918157de6e1cf0f0003127d01cf90467c3c2_amd64"
},
"product_reference": "registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:335c03975dd985354a57ac13f184918157de6e1cf0f0003127d01cf90467c3c2_amd64",
"relates_to_product_reference": "Red Hat Web Terminal 1.12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:a16c875367810b15a5aa0da2c128d20f295866a5dab65f93deeaa78621b6135c_amd64",
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:335c03975dd985354a57ac13f184918157de6e1cf0f0003127d01cf90467c3c2_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:47611b41d24a5d1382f279b46895ff6aaa12c39049f02c080fa464660ea0704b_amd64",
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:9a25718e20cc0f33082f4346cbfb63d71cb77c5c08bbcc4021ffa4552a4df16b_amd64"
],
"known_not_affected": [
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:a16c875367810b15a5aa0da2c128d20f295866a5dab65f93deeaa78621b6135c_amd64",
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:335c03975dd985354a57ac13f184918157de6e1cf0f0003127d01cf90467c3c2_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T20:49:08+00:00",
"details": "To start using the Web Terminal Operator, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.17 or higher.",
"product_ids": [
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:47611b41d24a5d1382f279b46895ff6aaa12c39049f02c080fa464660ea0704b_amd64",
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:9a25718e20cc0f33082f4346cbfb63d71cb77c5c08bbcc4021ffa4552a4df16b_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2371"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-exec-rhel9@sha256:47611b41d24a5d1382f279b46895ff6aaa12c39049f02c080fa464660ea0704b_amd64",
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-operator-bundle@sha256:a16c875367810b15a5aa0da2c128d20f295866a5dab65f93deeaa78621b6135c_amd64",
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-rhel9-operator@sha256:9a25718e20cc0f33082f4346cbfb63d71cb77c5c08bbcc4021ffa4552a4df16b_amd64",
"Red Hat Web Terminal 1.12:registry.redhat.io/web-terminal/web-terminal-tooling-rhel9@sha256:335c03975dd985354a57ac13f184918157de6e1cf0f0003127d01cf90467c3c2_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2124
Vulnerability from csaf_redhat - Published: 2026-02-05 14:55 - Updated: 2026-02-13 23:28Summary
Red Hat Security Advisory: osbuild-composer security update
Notes
Topic
An update for osbuild-composer is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
A service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Besides building images for local usage, it can also upload images directly to cloud. It is compatible with composer-cli and cockpit-composer clients.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for osbuild-composer is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "A service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Besides building images for local usage, it can also upload images directly to cloud. It is compatible with composer-cli and cockpit-composer clients.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2124",
"url": "https://access.redhat.com/errata/RHSA-2026:2124"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2124.json"
}
],
"title": "Red Hat Security Advisory: osbuild-composer security update",
"tracking": {
"current_release_date": "2026-02-13T23:28:25+00:00",
"generator": {
"date": "2026-02-13T23:28:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2124",
"initial_release_date": "2026-02-05T14:55:40+00:00",
"revision_history": [
{
"date": "2026-02-05T14:55:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-05T14:55:40+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-13T23:28:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:101.4-3.el8_10.src",
"product": {
"name": "osbuild-composer-0:101.4-3.el8_10.src",
"product_id": "osbuild-composer-0:101.4-3.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@101.4-3.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:101.4-3.el8_10.aarch64",
"product": {
"name": "osbuild-composer-0:101.4-3.el8_10.aarch64",
"product_id": "osbuild-composer-0:101.4-3.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@101.4-3.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-0:101.4-3.el8_10.aarch64",
"product": {
"name": "osbuild-composer-core-0:101.4-3.el8_10.aarch64",
"product_id": "osbuild-composer-core-0:101.4-3.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core@101.4-3.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-0:101.4-3.el8_10.aarch64",
"product": {
"name": "osbuild-composer-worker-0:101.4-3.el8_10.aarch64",
"product_id": "osbuild-composer-worker-0:101.4-3.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker@101.4-3.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.aarch64",
"product": {
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.aarch64",
"product_id": "osbuild-composer-debugsource-0:101.4-3.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debugsource@101.4-3.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.aarch64",
"product": {
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.aarch64",
"product_id": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core-debuginfo@101.4-3.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.aarch64",
"product": {
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.aarch64",
"product_id": "osbuild-composer-debuginfo-0:101.4-3.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debuginfo@101.4-3.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.aarch64",
"product": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.aarch64",
"product_id": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-tests-debuginfo@101.4-3.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.aarch64",
"product": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.aarch64",
"product_id": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker-debuginfo@101.4-3.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:101.4-3.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-0:101.4-3.el8_10.ppc64le",
"product_id": "osbuild-composer-0:101.4-3.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@101.4-3.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-0:101.4-3.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-core-0:101.4-3.el8_10.ppc64le",
"product_id": "osbuild-composer-core-0:101.4-3.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core@101.4-3.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-0:101.4-3.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-worker-0:101.4-3.el8_10.ppc64le",
"product_id": "osbuild-composer-worker-0:101.4-3.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker@101.4-3.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.ppc64le",
"product_id": "osbuild-composer-debugsource-0:101.4-3.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debugsource@101.4-3.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.ppc64le",
"product_id": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core-debuginfo@101.4-3.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.ppc64le",
"product_id": "osbuild-composer-debuginfo-0:101.4-3.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debuginfo@101.4-3.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.ppc64le",
"product_id": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-tests-debuginfo@101.4-3.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.ppc64le",
"product_id": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker-debuginfo@101.4-3.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:101.4-3.el8_10.x86_64",
"product": {
"name": "osbuild-composer-0:101.4-3.el8_10.x86_64",
"product_id": "osbuild-composer-0:101.4-3.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@101.4-3.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-0:101.4-3.el8_10.x86_64",
"product": {
"name": "osbuild-composer-core-0:101.4-3.el8_10.x86_64",
"product_id": "osbuild-composer-core-0:101.4-3.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core@101.4-3.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-0:101.4-3.el8_10.x86_64",
"product": {
"name": "osbuild-composer-worker-0:101.4-3.el8_10.x86_64",
"product_id": "osbuild-composer-worker-0:101.4-3.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker@101.4-3.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.x86_64",
"product": {
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.x86_64",
"product_id": "osbuild-composer-debugsource-0:101.4-3.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debugsource@101.4-3.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.x86_64",
"product": {
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.x86_64",
"product_id": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core-debuginfo@101.4-3.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.x86_64",
"product": {
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.x86_64",
"product_id": "osbuild-composer-debuginfo-0:101.4-3.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debuginfo@101.4-3.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.x86_64",
"product": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.x86_64",
"product_id": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-tests-debuginfo@101.4-3.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.x86_64",
"product": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.x86_64",
"product_id": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker-debuginfo@101.4-3.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:101.4-3.el8_10.s390x",
"product": {
"name": "osbuild-composer-0:101.4-3.el8_10.s390x",
"product_id": "osbuild-composer-0:101.4-3.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@101.4-3.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-0:101.4-3.el8_10.s390x",
"product": {
"name": "osbuild-composer-core-0:101.4-3.el8_10.s390x",
"product_id": "osbuild-composer-core-0:101.4-3.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core@101.4-3.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-0:101.4-3.el8_10.s390x",
"product": {
"name": "osbuild-composer-worker-0:101.4-3.el8_10.s390x",
"product_id": "osbuild-composer-worker-0:101.4-3.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker@101.4-3.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.s390x",
"product": {
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.s390x",
"product_id": "osbuild-composer-debugsource-0:101.4-3.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debugsource@101.4-3.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.s390x",
"product": {
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.s390x",
"product_id": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core-debuginfo@101.4-3.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.s390x",
"product": {
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.s390x",
"product_id": "osbuild-composer-debuginfo-0:101.4-3.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debuginfo@101.4-3.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.s390x",
"product": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.s390x",
"product_id": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-tests-debuginfo@101.4-3.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.s390x",
"product": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.s390x",
"product_id": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker-debuginfo@101.4-3.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:101.4-3.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.aarch64"
},
"product_reference": "osbuild-composer-0:101.4-3.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:101.4-3.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-0:101.4-3.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:101.4-3.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.s390x"
},
"product_reference": "osbuild-composer-0:101.4-3.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:101.4-3.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.src"
},
"product_reference": "osbuild-composer-0:101.4-3.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:101.4-3.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.x86_64"
},
"product_reference": "osbuild-composer-0:101.4-3.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-0:101.4-3.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.aarch64"
},
"product_reference": "osbuild-composer-core-0:101.4-3.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-0:101.4-3.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-core-0:101.4-3.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-0:101.4-3.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.s390x"
},
"product_reference": "osbuild-composer-core-0:101.4-3.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-0:101.4-3.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.x86_64"
},
"product_reference": "osbuild-composer-core-0:101.4-3.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.aarch64"
},
"product_reference": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.s390x"
},
"product_reference": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.x86_64"
},
"product_reference": "osbuild-composer-core-debuginfo-0:101.4-3.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.aarch64"
},
"product_reference": "osbuild-composer-debuginfo-0:101.4-3.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-debuginfo-0:101.4-3.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.s390x"
},
"product_reference": "osbuild-composer-debuginfo-0:101.4-3.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debuginfo-0:101.4-3.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.x86_64"
},
"product_reference": "osbuild-composer-debuginfo-0:101.4-3.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.aarch64"
},
"product_reference": "osbuild-composer-debugsource-0:101.4-3.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-debugsource-0:101.4-3.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.s390x"
},
"product_reference": "osbuild-composer-debugsource-0:101.4-3.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debugsource-0:101.4-3.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.x86_64"
},
"product_reference": "osbuild-composer-debugsource-0:101.4-3.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.aarch64"
},
"product_reference": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.s390x"
},
"product_reference": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.x86_64"
},
"product_reference": "osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-0:101.4-3.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.aarch64"
},
"product_reference": "osbuild-composer-worker-0:101.4-3.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-0:101.4-3.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-worker-0:101.4-3.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-0:101.4-3.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.s390x"
},
"product_reference": "osbuild-composer-worker-0:101.4-3.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-0:101.4-3.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.x86_64"
},
"product_reference": "osbuild-composer-worker-0:101.4-3.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.aarch64"
},
"product_reference": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.s390x"
},
"product_reference": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.x86_64"
},
"product_reference": "osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T14:55:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2124"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-3.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-3.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2218
Vulnerability from csaf_redhat - Published: 2026-02-09 01:55 - Updated: 2026-02-13 23:28Summary
Red Hat Security Advisory: golang security update
Notes
Topic
An update for golang is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The golang packages provide the Go programming language compiler.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2218",
"url": "https://access.redhat.com/errata/RHSA-2026:2218"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2218.json"
}
],
"title": "Red Hat Security Advisory: golang security update",
"tracking": {
"current_release_date": "2026-02-13T23:28:29+00:00",
"generator": {
"date": "2026-02-13T23:28:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2218",
"initial_release_date": "2026-02-09T01:55:26+00:00",
"revision_history": [
{
"date": "2026-02-09T01:55:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T01:55:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-13T23:28:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.21.13-13.el9_4.aarch64",
"product": {
"name": "go-toolset-0:1.21.13-13.el9_4.aarch64",
"product_id": "go-toolset-0:1.21.13-13.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.21.13-13.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.21.13-13.el9_4.aarch64",
"product": {
"name": "golang-0:1.21.13-13.el9_4.aarch64",
"product_id": "golang-0:1.21.13-13.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.21.13-13.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.21.13-13.el9_4.aarch64",
"product": {
"name": "golang-bin-0:1.21.13-13.el9_4.aarch64",
"product_id": "golang-bin-0:1.21.13-13.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.21.13-13.el9_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.21.13-13.el9_4.ppc64le",
"product": {
"name": "go-toolset-0:1.21.13-13.el9_4.ppc64le",
"product_id": "go-toolset-0:1.21.13-13.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.21.13-13.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.21.13-13.el9_4.ppc64le",
"product": {
"name": "golang-0:1.21.13-13.el9_4.ppc64le",
"product_id": "golang-0:1.21.13-13.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.21.13-13.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.21.13-13.el9_4.ppc64le",
"product": {
"name": "golang-bin-0:1.21.13-13.el9_4.ppc64le",
"product_id": "golang-bin-0:1.21.13-13.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.21.13-13.el9_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.21.13-13.el9_4.x86_64",
"product": {
"name": "go-toolset-0:1.21.13-13.el9_4.x86_64",
"product_id": "go-toolset-0:1.21.13-13.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.21.13-13.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.21.13-13.el9_4.x86_64",
"product": {
"name": "golang-0:1.21.13-13.el9_4.x86_64",
"product_id": "golang-0:1.21.13-13.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.21.13-13.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.21.13-13.el9_4.x86_64",
"product": {
"name": "golang-bin-0:1.21.13-13.el9_4.x86_64",
"product_id": "golang-bin-0:1.21.13-13.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.21.13-13.el9_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.21.13-13.el9_4.s390x",
"product": {
"name": "go-toolset-0:1.21.13-13.el9_4.s390x",
"product_id": "go-toolset-0:1.21.13-13.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.21.13-13.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.21.13-13.el9_4.s390x",
"product": {
"name": "golang-0:1.21.13-13.el9_4.s390x",
"product_id": "golang-0:1.21.13-13.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.21.13-13.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.21.13-13.el9_4.s390x",
"product": {
"name": "golang-bin-0:1.21.13-13.el9_4.s390x",
"product_id": "golang-bin-0:1.21.13-13.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.21.13-13.el9_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.21.13-13.el9_4.src",
"product": {
"name": "golang-0:1.21.13-13.el9_4.src",
"product_id": "golang-0:1.21.13-13.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.21.13-13.el9_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.21.13-13.el9_4.noarch",
"product": {
"name": "golang-docs-0:1.21.13-13.el9_4.noarch",
"product_id": "golang-docs-0:1.21.13-13.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.21.13-13.el9_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.21.13-13.el9_4.noarch",
"product": {
"name": "golang-misc-0:1.21.13-13.el9_4.noarch",
"product_id": "golang-misc-0:1.21.13-13.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.21.13-13.el9_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.21.13-13.el9_4.noarch",
"product": {
"name": "golang-src-0:1.21.13-13.el9_4.noarch",
"product_id": "golang-src-0:1.21.13-13.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.21.13-13.el9_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.21.13-13.el9_4.noarch",
"product": {
"name": "golang-tests-0:1.21.13-13.el9_4.noarch",
"product_id": "golang-tests-0:1.21.13-13.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.21.13-13.el9_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.21.13-13.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.aarch64"
},
"product_reference": "go-toolset-0:1.21.13-13.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.21.13-13.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.ppc64le"
},
"product_reference": "go-toolset-0:1.21.13-13.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.21.13-13.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.s390x"
},
"product_reference": "go-toolset-0:1.21.13-13.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.21.13-13.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.x86_64"
},
"product_reference": "go-toolset-0:1.21.13-13.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.21.13-13.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.aarch64"
},
"product_reference": "golang-0:1.21.13-13.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.21.13-13.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.ppc64le"
},
"product_reference": "golang-0:1.21.13-13.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.21.13-13.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.s390x"
},
"product_reference": "golang-0:1.21.13-13.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.21.13-13.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.src"
},
"product_reference": "golang-0:1.21.13-13.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.21.13-13.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.x86_64"
},
"product_reference": "golang-0:1.21.13-13.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.21.13-13.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.aarch64"
},
"product_reference": "golang-bin-0:1.21.13-13.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.21.13-13.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.ppc64le"
},
"product_reference": "golang-bin-0:1.21.13-13.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.21.13-13.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.s390x"
},
"product_reference": "golang-bin-0:1.21.13-13.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.21.13-13.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.x86_64"
},
"product_reference": "golang-bin-0:1.21.13-13.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.21.13-13.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-docs-0:1.21.13-13.el9_4.noarch"
},
"product_reference": "golang-docs-0:1.21.13-13.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.21.13-13.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-misc-0:1.21.13-13.el9_4.noarch"
},
"product_reference": "golang-misc-0:1.21.13-13.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.21.13-13.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-src-0:1.21.13-13.el9_4.noarch"
},
"product_reference": "golang-src-0:1.21.13-13.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.21.13-13.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:golang-tests-0:1.21.13-13.el9_4.noarch"
},
"product_reference": "golang-tests-0:1.21.13-13.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.src",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:golang-docs-0:1.21.13-13.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:golang-misc-0:1.21.13-13.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:golang-src-0:1.21.13-13.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:golang-tests-0:1.21.13-13.el9_4.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T01:55:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.src",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:golang-docs-0:1.21.13-13.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:golang-misc-0:1.21.13-13.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:golang-src-0:1.21.13-13.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:golang-tests-0:1.21.13-13.el9_4.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2218"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-13.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.src",
"AppStream-9.4.0.Z.EUS:golang-0:1.21.13-13.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-13.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:golang-docs-0:1.21.13-13.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:golang-misc-0:1.21.13-13.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:golang-src-0:1.21.13-13.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:golang-tests-0:1.21.13-13.el9_4.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2136
Vulnerability from csaf_redhat - Published: 2026-02-05 15:17 - Updated: 2026-02-14 07:25Summary
Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release
Notes
Topic
The 1.3.2 release of Red Hat Trusted Artifact Signer OpenShift Operator.
For more details please visit the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3
Details
The RHTAS Operator can be used with OpenShift Container Platform 4.16, 4.17, 4.18, 4.19, and 4.20
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The 1.3.2 release of Red Hat Trusted Artifact Signer OpenShift Operator.\nFor more details please visit the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3",
"title": "Topic"
},
{
"category": "general",
"text": "The RHTAS Operator can be used with OpenShift Container Platform 4.16, 4.17, 4.18, 4.19, and 4.20",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2136",
"url": "https://access.redhat.com/errata/RHSA-2026:2136"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3",
"url": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47913",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66506",
"url": "https://access.redhat.com/security/cve/CVE-2025-66506"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22772",
"url": "https://access.redhat.com/security/cve/CVE-2026-22772"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2136.json"
}
],
"title": "Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release",
"tracking": {
"current_release_date": "2026-02-14T07:25:38+00:00",
"generator": {
"date": "2026-02-14T07:25:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2136",
"initial_release_date": "2026-02-05T15:17:09+00:00",
"revision_history": [
{
"date": "2026-02-05T15:17:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-05T15:17:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-14T07:25:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Trusted Artifact Signer 1.3",
"product": {
"name": "Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:trusted_artifact_signer:1.3::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Trusted Artifact Signer"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"product": {
"name": "registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"product_id": "registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cosign-rhel9@sha256%3Aa8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770107585"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"product": {
"name": "registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"product_id": "registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fetch-tsa-certs-rhel9@sha256%3A358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770107440"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"product": {
"name": "registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"product_id": "registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitsign-rhel9@sha256%3A3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770108193"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"product": {
"name": "registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"product_id": "registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rekor-cli-rhel9@sha256%3A63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770106163"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64",
"product": {
"name": "registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64",
"product_id": "registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64",
"product_identification_helper": {
"purl": "pkg:oci/updatetree-rhel9@sha256%3A67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770106156"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64"
},
"product_reference": "registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64"
},
"product_reference": "registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64"
},
"product_reference": "registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64"
},
"product_reference": "registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
},
"product_reference": "registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47913",
"discovery_date": "2025-11-13T22:01:26.092452+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414943"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic(\"unreachable\") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling\u2014or intercepting\u2014SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into \u201cunreachable\u201d code paths instead of being handled gracefully\u2014making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "RHBZ#2414943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hcg3-q754-cr77",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"category": "external",
"summary": "https://go.dev/cl/700295",
"url": "https://go.dev/cl/700295"
},
{
"category": "external",
"summary": "https://go.dev/issue/75178",
"url": "https://go.dev/issue/75178"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4116",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"release_date": "2025-11-13T21:29:39.907000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:17:09+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2136"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:17:09+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2136"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-66506",
"cwe": {
"id": "CWE-405",
"name": "Asymmetric Resource Consumption (Amplification)"
},
"discovery_date": "2025-12-04T23:01:20.507333+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419056"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Fulcio, a free-to-use certificate authority. This vulnerability allows a denial of service (DoS) due to excessive memory allocation when processing a malicious OpenID Connect (OIDC) identity token containing numerous period characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/sigstore/fulcio: Fulcio: Denial of Service via crafted OpenID Connect (OIDC) token",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat as Fulcio, a certificate authority used for issuing code signing certificates, is susceptible to a denial of service when processing a specially crafted OpenID Connect (OIDC) token. This could lead to resource exhaustion and service unavailability in affected Red Hat products that utilize Fulcio.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66506"
},
{
"category": "external",
"summary": "RHBZ#2419056",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419056"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66506"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/commit/765a0e57608b9ef390e1eeeea8595b9054c63a5a",
"url": "https://github.com/sigstore/fulcio/commit/765a0e57608b9ef390e1eeeea8595b9054c63a5a"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/security/advisories/GHSA-f83f-xpx7-ffpw",
"url": "https://github.com/sigstore/fulcio/security/advisories/GHSA-f83f-xpx7-ffpw"
}
],
"release_date": "2025-12-04T22:04:41.637000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:17:09+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2136"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/sigstore/fulcio: Fulcio: Denial of Service via crafted OpenID Connect (OIDC) token"
},
{
"cve": "CVE-2026-22772",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"discovery_date": "2026-01-12T22:01:21.336171+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2428808"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Fulcio, a certificate authority for issuing code signing certificates. A remote attacker could exploit this by bypassing MetaIssuer URL validation due to unanchored regular expressions (regex) in the `metaRegex()` function. This vulnerability could lead to Server-Side Request Forgery (SSRF), allowing the attacker to probe internal network services. While the flaw only permits GET requests, preventing state changes or data exfiltration, it still poses a risk for internal network reconnaissance.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "fulcio: Fulcio: Server-Side Request Forgery (SSRF) via unanchored regex in MetaIssuer URL validation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat products. A flaw in Fulcio\u0027s URL validation allows attackers to bypass security checks, leading to Server-Side Request Forgery (SSRF). This could enable internal network reconnaissance within affected Red Hat OpenShift and Ansible Automation Platform deployments, though it does not permit state changes or data exfiltration.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22772"
},
{
"category": "external",
"summary": "RHBZ#2428808",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2428808"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22772",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22772"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22772",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22772"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/commit/eaae2f2be56df9dea5f9b439ec81bedae4c0978d",
"url": "https://github.com/sigstore/fulcio/commit/eaae2f2be56df9dea5f9b439ec81bedae4c0978d"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/security/advisories/GHSA-59jp-pj84-45mr",
"url": "https://github.com/sigstore/fulcio/security/advisories/GHSA-59jp-pj84-45mr"
}
],
"release_date": "2026-01-12T20:58:53.659000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:17:09+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2136"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/cosign-rhel9@sha256:a8289d488491991d454a32784de19476f2c984917eb7a33b4544e55512f2747c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fetch-tsa-certs-rhel9@sha256:358e6addb56ff342bc8d850399b872f039bb9cbd7f108f0838e8e50d54b24857_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/gitsign-rhel9@sha256:3c39718e61d13648afcb5b0f5741aa771caf9b2f8c52e4af9dfa0635d5b05894_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-cli-rhel9@sha256:63db8fe95e158a74d31bcfca03a4c8d505012870d594e8fd97cc0cb2af13fe65_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/updatetree-rhel9@sha256:67ff8332c09e00cb370355d16f1d06c16ff482e7a8857cdff4f556fae298f951_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "fulcio: Fulcio: Server-Side Request Forgery (SSRF) via unanchored regex in MetaIssuer URL validation"
}
]
}
RHSA-2026:1518
Vulnerability from csaf_redhat - Published: 2026-01-28 23:26 - Updated: 2026-02-13 23:28Summary
Red Hat Security Advisory: grafana-pcp security update
Notes
Topic
An update for grafana-pcp is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana-pcp is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1518",
"url": "https://access.redhat.com/errata/RHSA-2026:1518"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1518.json"
}
],
"title": "Red Hat Security Advisory: grafana-pcp security update",
"tracking": {
"current_release_date": "2026-02-13T23:28:12+00:00",
"generator": {
"date": "2026-02-13T23:28:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1518",
"initial_release_date": "2026-01-28T23:26:14+00:00",
"revision_history": [
{
"date": "2026-01-28T23:26:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-28T23:26:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-13T23:28:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-11.el8_10.src",
"product": {
"name": "grafana-pcp-0:5.1.1-11.el8_10.src",
"product_id": "grafana-pcp-0:5.1.1-11.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-11.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-11.el8_10.aarch64",
"product": {
"name": "grafana-pcp-0:5.1.1-11.el8_10.aarch64",
"product_id": "grafana-pcp-0:5.1.1-11.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-11.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.aarch64",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.aarch64",
"product_id": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-11.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.aarch64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.aarch64",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-11.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-11.el8_10.ppc64le",
"product": {
"name": "grafana-pcp-0:5.1.1-11.el8_10.ppc64le",
"product_id": "grafana-pcp-0:5.1.1-11.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-11.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.ppc64le",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.ppc64le",
"product_id": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-11.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.ppc64le",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.ppc64le",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-11.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-11.el8_10.x86_64",
"product": {
"name": "grafana-pcp-0:5.1.1-11.el8_10.x86_64",
"product_id": "grafana-pcp-0:5.1.1-11.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-11.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.x86_64",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.x86_64",
"product_id": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-11.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.x86_64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.x86_64",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-11.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-11.el8_10.s390x",
"product": {
"name": "grafana-pcp-0:5.1.1-11.el8_10.s390x",
"product_id": "grafana-pcp-0:5.1.1-11.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-11.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.s390x",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.s390x",
"product_id": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-11.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.s390x",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.s390x",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-11.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-11.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.aarch64"
},
"product_reference": "grafana-pcp-0:5.1.1-11.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-11.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.ppc64le"
},
"product_reference": "grafana-pcp-0:5.1.1-11.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-11.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.s390x"
},
"product_reference": "grafana-pcp-0:5.1.1-11.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-11.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.src"
},
"product_reference": "grafana-pcp-0:5.1.1-11.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-11.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.x86_64"
},
"product_reference": "grafana-pcp-0:5.1.1-11.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.aarch64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.ppc64le"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.s390x"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.x86_64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-11.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.aarch64"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.ppc64le"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.s390x"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.x86_64"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-11.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-28T23:26:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1518"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-11.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-11.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-11.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2265
Vulnerability from csaf_redhat - Published: 2026-02-09 05:56 - Updated: 2026-02-13 23:28Summary
Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update
Notes
Topic
An update for golang-github-openprinting-ipp-usb is now available for Red Hat Enterprise Linux 10.0 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
HTTP reverse proxy, backed by IPP-over-USB connection to device. It enables
driverless support for USB devices capable of using IPP-over-USB protocol.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang-github-openprinting-ipp-usb is now available for Red Hat Enterprise Linux 10.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "HTTP reverse proxy, backed by IPP-over-USB connection to device. It enables\n driverless support for USB devices capable of using IPP-over-USB protocol.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2265",
"url": "https://access.redhat.com/errata/RHSA-2026:2265"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2265.json"
}
],
"title": "Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update",
"tracking": {
"current_release_date": "2026-02-13T23:28:30+00:00",
"generator": {
"date": "2026-02-13T23:28:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2265",
"initial_release_date": "2026-02-09T05:56:42+00:00",
"revision_history": [
{
"date": "2026-02-09T05:56:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T05:56:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-13T23:28:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux_eus:10.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-0:0.9.27-3.el10_0.1.src",
"product": {
"name": "golang-github-openprinting-ipp-usb-0:0.9.27-3.el10_0.1.src",
"product_id": "golang-github-openprinting-ipp-usb-0:0.9.27-3.el10_0.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb@0.9.27-3.el10_0.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ipp-usb-0:0.9.27-3.el10_0.1.aarch64",
"product": {
"name": "ipp-usb-0:0.9.27-3.el10_0.1.aarch64",
"product_id": "ipp-usb-0:0.9.27-3.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb@0.9.27-3.el10_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.aarch64",
"product": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.aarch64",
"product_id": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb-debugsource@0.9.27-3.el10_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.aarch64",
"product": {
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.aarch64",
"product_id": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb-debuginfo@0.9.27-3.el10_0.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ipp-usb-0:0.9.27-3.el10_0.1.ppc64le",
"product": {
"name": "ipp-usb-0:0.9.27-3.el10_0.1.ppc64le",
"product_id": "ipp-usb-0:0.9.27-3.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb@0.9.27-3.el10_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.ppc64le",
"product": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.ppc64le",
"product_id": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb-debugsource@0.9.27-3.el10_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.ppc64le",
"product": {
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.ppc64le",
"product_id": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb-debuginfo@0.9.27-3.el10_0.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ipp-usb-0:0.9.27-3.el10_0.1.s390x",
"product": {
"name": "ipp-usb-0:0.9.27-3.el10_0.1.s390x",
"product_id": "ipp-usb-0:0.9.27-3.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb@0.9.27-3.el10_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.s390x",
"product": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.s390x",
"product_id": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb-debugsource@0.9.27-3.el10_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.s390x",
"product": {
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.s390x",
"product_id": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb-debuginfo@0.9.27-3.el10_0.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ipp-usb-0:0.9.27-3.el10_0.1.x86_64",
"product": {
"name": "ipp-usb-0:0.9.27-3.el10_0.1.x86_64",
"product_id": "ipp-usb-0:0.9.27-3.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb@0.9.27-3.el10_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.x86_64",
"product": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.x86_64",
"product_id": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb-debugsource@0.9.27-3.el10_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.x86_64",
"product": {
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.x86_64",
"product_id": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb-debuginfo@0.9.27-3.el10_0.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-0:0.9.27-3.el10_0.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-0:0.9.27-3.el10_0.1.src"
},
"product_reference": "golang-github-openprinting-ipp-usb-0:0.9.27-3.el10_0.1.src",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.aarch64"
},
"product_reference": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.ppc64le"
},
"product_reference": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.s390x"
},
"product_reference": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.x86_64"
},
"product_reference": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-0:0.9.27-3.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.aarch64"
},
"product_reference": "ipp-usb-0:0.9.27-3.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-0:0.9.27-3.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.ppc64le"
},
"product_reference": "ipp-usb-0:0.9.27-3.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-0:0.9.27-3.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.s390x"
},
"product_reference": "ipp-usb-0:0.9.27-3.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-0:0.9.27-3.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.x86_64"
},
"product_reference": "ipp-usb-0:0.9.27-3.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.aarch64"
},
"product_reference": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.ppc64le"
},
"product_reference": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.s390x"
},
"product_reference": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.x86_64"
},
"product_reference": "ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-0:0.9.27-3.el10_0.1.src",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T05:56:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-0:0.9.27-3.el10_0.1.src",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2265"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-0:0.9.27-3.el10_0.1.src",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-3.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:ipp-usb-0:0.9.27-3.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:ipp-usb-debuginfo-0:0.9.27-3.el10_0.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2149
Vulnerability from csaf_redhat - Published: 2026-02-05 16:16 - Updated: 2026-02-14 02:54Summary
Red Hat Security Advisory: Kiali 2.17.3 for Red Hat OpenShift Service Mesh 3.2
Notes
Topic
Kiali 2.17.3 for Red Hat OpenShift Service Mesh 3.2
This update has a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Kiali 2.17.3, for Red Hat OpenShift Service Mesh 3.2, provides observability for the service mesh by offering a visual representation of the mesh topology and metrics, helping users monitor, trace, and manage efficiently.
Security Fix(es):
* kiali-ossmc-rhel9: qs: Denial of Service via improper input validation in array parsing (CVE-2025-15284)
* kiali-rhel9: qs: Denial of Service via improper input validation in array parsing (CVE-2025-15284)
* kiali-rhel9: Excessive resource consumption when printing error string for host certificate validation in crypto/x509 (CVE-2025-61729)
* kiali-ossmc-rhel9: React Router vulnerable to XSS via Open Redirects (CVE-2026-22029)
* kiali-rhel9: React Router vulnerable to XSS via Open Redirects (CVE-2026-22029)
* kiali-ossmc-rhel9: prototype pollution in _.unset and _.omit functions (CVE-2025-13465)
* kiali-rhel9: prototype pollution in _.unset and _.omit functions (CVE-2025-13465)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Kiali 2.17.3 for Red Hat OpenShift Service Mesh 3.2\n\nThis update has a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kiali 2.17.3, for Red Hat OpenShift Service Mesh 3.2, provides observability for the service mesh by offering a visual representation of the mesh topology and metrics, helping users monitor, trace, and manage efficiently.\n\nSecurity Fix(es):\n\n* kiali-ossmc-rhel9: qs: Denial of Service via improper input validation in array parsing (CVE-2025-15284)\n\n* kiali-rhel9: qs: Denial of Service via improper input validation in array parsing (CVE-2025-15284)\n\n* kiali-rhel9: Excessive resource consumption when printing error string for host certificate validation in crypto/x509 (CVE-2025-61729)\n\n* kiali-ossmc-rhel9: React Router vulnerable to XSS via Open Redirects (CVE-2026-22029)\n\n* kiali-rhel9: React Router vulnerable to XSS via Open Redirects (CVE-2026-22029)\n\n* kiali-ossmc-rhel9: prototype pollution in _.unset and _.omit functions (CVE-2025-13465)\n\n* kiali-rhel9: prototype pollution in _.unset and _.omit functions (CVE-2025-13465)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2149",
"url": "https://access.redhat.com/errata/RHSA-2026:2149"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13465",
"url": "https://access.redhat.com/security/cve/CVE-2025-13465"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15284",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22029",
"url": "https://access.redhat.com/security/cve/CVE-2026-22029"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-13465",
"url": "https://access.redhat.com/security/cve/cve-2025-13465"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-15284",
"url": "https://access.redhat.com/security/cve/cve-2025-15284"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-61729",
"url": "https://access.redhat.com/security/cve/cve-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2026-22029",
"url": "https://access.redhat.com/security/cve/cve-2026-22029"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification",
"url": "https://access.redhat.com/security/updates/classification"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2149.json"
}
],
"title": "Red Hat Security Advisory: Kiali 2.17.3 for Red Hat OpenShift Service Mesh 3.2",
"tracking": {
"current_release_date": "2026-02-14T02:54:44+00:00",
"generator": {
"date": "2026-02-14T02:54:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2149",
"initial_release_date": "2026-02-05T16:16:04+00:00",
"revision_history": [
{
"date": "2026-02-05T16:16:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-05T16:16:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-14T02:54:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Service Mesh 3.2",
"product": {
"name": "Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_mesh:3.2::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Service Mesh"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9@sha256%3Aa97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770138513"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-operator-bundle@sha256%3Af3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770146001"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9-operator@sha256%3A447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770140298"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-ossmc-rhel9@sha256%3Ac602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770142326"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9@sha256%3Ad9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770138513"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9-operator@sha256%3A46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770140298"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kiali-ossmc-rhel9@sha256%3Afcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770142326"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9@sha256%3Aef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770138513"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9-operator@sha256%3Ad1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770140298"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kiali-ossmc-rhel9@sha256%3A700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770142326"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9@sha256%3Aced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770138513"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kiali-rhel9-operator@sha256%3A22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770140298"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"product_id": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kiali-ossmc-rhel9@sha256%3Ad2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1770142326"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64 as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64 as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64 as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64 as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64 as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64 as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64 as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le as a component of Red Hat OpenShift Service Mesh 3.2",
"product_id": "Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 3.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13465",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"discovery_date": "2026-01-21T20:01:28.774829+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431740"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Lodash. A prototype pollution vulnerability in the _.unset and _.omit functions allows an attacker able to control property paths to delete methods from global prototypes. By removing essential functionalities, this can result in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lodash: prototype pollution in _.unset and _.omit functions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is only exploitable by applications using the _.unset and _.omit functions on an object and allowing user input to determine the path of the property to be removed. This issue only allows the deletion of properties but does not allow overwriting their behavior, limiting the impact to a denial of service. Due to this reason, this vulnerability has been rated with an important severity.\n\nIn Grafana, JavaScript code runs only in the browser, while the server side is all Golang. Therefore, the worst-case scenario is a loss of functionality in the client application inside the browser. To reflect this, the CVSS availability metric and the severity of the Grafana and the Grafana-PCP component have been updated to low and moderate, respectively.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13465"
},
{
"category": "external",
"summary": "RHBZ#2431740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431740"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13465"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13465",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13465"
},
{
"category": "external",
"summary": "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg",
"url": "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg"
}
],
"release_date": "2026-01-21T19:05:28.846000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:16:04+00:00",
"details": "See Kiali 2.17.3 documentation at https://docs.redhat.com/en/documentation/red_hat_openshift_service_mesh/3.2/html/observability/kiali-operator-provided-by-red-hat",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2149"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement strict input validation before passing any property paths to the _.unset and _.omit functions to block attempts to access the prototype chain. Ensure that strings like __proto__, constructor and prototype are blocked, for example.",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "lodash: prototype pollution in _.unset and _.omit functions"
},
{
"cve": "CVE-2025-15284",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-29T23:00:58.541337+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2425946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in qs, a module used for parsing query strings. A remote attacker can exploit an improper input validation vulnerability by sending specially crafted HTTP requests that use bracket notation (e.g., `a[]=value`). This bypasses the `arrayLimit` option, which is designed to limit the size of parsed arrays and prevent resource exhaustion. Successful exploitation can lead to memory exhaustion, causing a Denial of Service (DoS) where the application crashes or becomes unresponsive, making the service unavailable to users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "qs: qs: Denial of Service via improper input validation in array parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products that utilize the `qs` module for parsing query strings, particularly when processing user-controlled input with bracket notation. The `arrayLimit` option, intended to prevent resource exhaustion, is bypassed when bracket notation (`a[]=value`) is used, allowing a remote attacker to cause a denial of service through memory exhaustion. This can lead to application crashes or unresponsiveness, making the service unavailable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "RHBZ#2425946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9",
"url": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p",
"url": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p"
}
],
"release_date": "2025-12-29T22:56:45.240000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:16:04+00:00",
"details": "See Kiali 2.17.3 documentation at https://docs.redhat.com/en/documentation/red_hat_openshift_service_mesh/3.2/html/observability/kiali-operator-provided-by-red-hat",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2149"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "qs: qs: Denial of Service via improper input validation in array parsing"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:16:04+00:00",
"details": "See Kiali 2.17.3 documentation at https://docs.redhat.com/en/documentation/red_hat_openshift_service_mesh/3.2/html/observability/kiali-operator-provided-by-red-hat",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2149"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2026-22029",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2026-01-10T04:01:03.694749+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2428412"
}
],
"notes": [
{
"category": "description",
"text": "React Router is a router for React. In @remix-run/router version prior to 1.23.2. and react-router 7.0.0 through 7.11.0, React Router (and Remix v1/v2) SPA open navigation redirects originating from loaders or actions in Framework Mode, Data Mode, or the unstable RSC modes can result in unsafe URLs causing unintended javascript execution on the client. This is only an issue if you are creating redirect paths from untrusted content or via an open redirect. There is no impact if Declarative Mode (\u003cBrowserRouter\u003e) is being used. This issue has been patched in @remix-run/router version 1.23.2 and react-router version 7.12.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "@remix-run/router: react-router: React Router vulnerable to XSS via Open Redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22029"
},
{
"category": "external",
"summary": "RHBZ#2428412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2428412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22029",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22029"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22029",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22029"
},
{
"category": "external",
"summary": "https://github.com/remix-run/react-router/security/advisories/GHSA-2w69-qvjg-hvjx",
"url": "https://github.com/remix-run/react-router/security/advisories/GHSA-2w69-qvjg-hvjx"
}
],
"release_date": "2026-01-10T02:42:32.736000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:16:04+00:00",
"details": "See Kiali 2.17.3 documentation at https://docs.redhat.com/en/documentation/red_hat_openshift_service_mesh/3.2/html/observability/kiali-operator-provided-by-red-hat",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2149"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d_ppc64le",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca_amd64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe_s390x",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c_arm64",
"Red Hat OpenShift Service Mesh 3.2:registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "@remix-run/router: react-router: React Router vulnerable to XSS via Open Redirects"
}
]
}
RHSA-2026:2343
Vulnerability from csaf_redhat - Published: 2026-02-09 14:20 - Updated: 2026-02-14 13:27Summary
Red Hat Security Advisory: Red Hat OpenShift API for Data Protection
Notes
Topic
A new version of OpenShift API for Data Protection (OADP) is now available.
Details
OpenShift API for Data Protection (OADP) enables you to back up and restore
application resources, persistent volume data, and internal container
images to external backup storage. OADP enables both file system-based and
snapshot-based backups for persistent volumes.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A new version of OpenShift API for Data Protection (OADP) is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift API for Data Protection (OADP) enables you to back up and restore\napplication resources, persistent volume data, and internal container\nimages to external backup storage. OADP enables both file system-based and\nsnapshot-based backups for persistent volumes.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2343",
"url": "https://access.redhat.com/errata/RHSA-2026:2343"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-25621",
"url": "https://access.redhat.com/security/cve/CVE-2024-25621"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-52881",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58183",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/backup_and_restore/oadp-application-backup-and-restore",
"url": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/backup_and_restore/oadp-application-backup-and-restore"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2343.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift API for Data Protection",
"tracking": {
"current_release_date": "2026-02-14T13:27:14+00:00",
"generator": {
"date": "2026-02-14T13:27:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2343",
"initial_release_date": "2026-02-09T14:20:06+00:00",
"revision_history": [
{
"date": "2026-02-09T14:20:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T14:20:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-14T13:27:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift API for Data Protection 1.5",
"product": {
"name": "OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_api_data_protection:1.5::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift API for Data Protection"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"product_id": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-hypershift-velero-plugin-rhel9@sha256%3A2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768615081"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"product_id": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-kubevirt-velero-plugin-rhel9@sha256%3Ad3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768597155"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"product_id": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-mustgather-rhel9@sha256%3Ac0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768627772"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"product_id": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-non-admin-rhel9@sha256%3Afacd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768636701"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"product_id": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-rhel9-operator@sha256%3A3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768640301"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64",
"product_id": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-rhel9@sha256%3Ae9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768624122"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-rhel9@sha256%3Acfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768602558"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-aws-rhel9@sha256%3A45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768595491"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-gcp-rhel9@sha256%3A8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768625890"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-legacy-aws-rhel9@sha256%3Af2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768618777"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256%3A2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9?arch=amd64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768640265"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"product_id": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-hypershift-velero-plugin-rhel9@sha256%3A947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768615081"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"product_id": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-kubevirt-velero-plugin-rhel9@sha256%3A0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768597155"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"product_id": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-mustgather-rhel9@sha256%3A77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768627772"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"product_id": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-non-admin-rhel9@sha256%3A217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768636701"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"product_id": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-rhel9-operator@sha256%3A8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768640301"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"product_id": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-rhel9@sha256%3A152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768624122"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-rhel9@sha256%3Ae0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768602558"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-aws-rhel9@sha256%3Ac390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768595491"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-gcp-rhel9@sha256%3A939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768625890"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-legacy-aws-rhel9@sha256%3A39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768618777"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256%3Aeb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665?arch=arm64\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768640265"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"product_id": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-hypershift-velero-plugin-rhel9@sha256%3A28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768615081"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"product_id": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-kubevirt-velero-plugin-rhel9@sha256%3A26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768597155"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"product_id": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-mustgather-rhel9@sha256%3Aa28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768627772"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"product_id": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-non-admin-rhel9@sha256%3Ae80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768636701"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"product_id": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-rhel9-operator@sha256%3A79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768640301"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"product_id": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-rhel9@sha256%3A432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768624122"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-rhel9@sha256%3Ae3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768602558"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-aws-rhel9@sha256%3Add6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768595491"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-gcp-rhel9@sha256%3A8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768625890"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-legacy-aws-rhel9@sha256%3A0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768618777"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256%3Af4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16?arch=s390x\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768640265"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-hypershift-velero-plugin-rhel9@sha256%3A422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768615081"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-kubevirt-velero-plugin-rhel9@sha256%3Acabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768597155"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-mustgather-rhel9@sha256%3A803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768627772"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-non-admin-rhel9@sha256%3Af00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768636701"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-rhel9-operator@sha256%3Afb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768640301"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-rhel9@sha256%3A38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768624122"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-rhel9@sha256%3Aac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768602558"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-aws-rhel9@sha256%3A15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768595491"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-gcp-rhel9@sha256%3Af98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768625890"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-legacy-aws-rhel9@sha256%3A12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768618777"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"product": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"product_id": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256%3A815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp\u0026tag=1768640265"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64 as a component of OpenShift API for Data Protection 1.5",
"product_id": "OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
},
"product_reference": "registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64",
"relates_to_product_reference": "OpenShift API for Data Protection 1.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-25621",
"cwe": {
"id": "CWE-279",
"name": "Incorrect Execution-Assigned Permissions"
},
"discovery_date": "2025-11-06T19:01:04.402278+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2413190"
}
],
"notes": [
{
"category": "description",
"text": "containerd is an open-source container runtime. Versions 0.1.0 through 1.7.28, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4 and 2.2.0-beta.0 through 2.2.0-rc.1 have an overly broad default permission vulnerability. Directory paths `/var/lib/containerd`, `/run/containerd/io.containerd.grpc.v1.cri` and `/run/containerd/io.containerd.sandbox.controller.v1.shim` were all created with incorrect permissions. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. Workarounds include updating system administrator permissions so the host can manually chmod the directories to not have group or world accessible permissions, or to run containerd in rootless mode.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/containerd/containerd: containerd local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64"
],
"known_not_affected": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-25621"
},
{
"category": "external",
"summary": "RHBZ#2413190",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413190"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-25621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25621"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25621",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25621"
},
{
"category": "external",
"summary": "https://github.com/containerd/containerd/blob/main/docs/rootless.md",
"url": "https://github.com/containerd/containerd/blob/main/docs/rootless.md"
},
{
"category": "external",
"summary": "https://github.com/containerd/containerd/commit/7c59e8e9e970d38061a77b586b23655c352bfec5",
"url": "https://github.com/containerd/containerd/commit/7c59e8e9e970d38061a77b586b23655c352bfec5"
},
{
"category": "external",
"summary": "https://github.com/containerd/containerd/security/advisories/GHSA-pwhc-rpq9-4c8w",
"url": "https://github.com/containerd/containerd/security/advisories/GHSA-pwhc-rpq9-4c8w"
}
],
"release_date": "2025-11-06T18:36:21.566000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T14:20:06+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2343"
},
{
"category": "workaround",
"details": "The system administrator on the host can manually chmod the directories to not\nhave group or world accessible permissions:\n```\nchmod 700 /var/lib/containerd\nchmod 700 /run/containerd/io.containerd.grpc.v1.cri\nchmod 700 /run/containerd/io.containerd.sandbox.controller.v1.shim\n```\nAn alternative mitigation would be to run containerd in rootless mode.",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/containerd/containerd: containerd local privilege escalation"
},
{
"cve": "CVE-2025-52881",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2025-10-17T14:19:18.652000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2404715"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in runc. This attack is a more sophisticated variant of CVE-2019-16884, which was a flaw that allowed an attacker to trick runc into writing the LSM process labels for a container process into a dummy tmpfs file and thus not apply the correct LSM labels to the container process. The mitigation applied for CVE-2019-16884 was fairly limited and effectively only caused runc to verify that when we write LSM labels that those labels are actual procfs files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat considers this as an Important flaw since the impact is limited to local attack with minimal privileges in order to jeopardize the environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x"
],
"known_not_affected": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "RHBZ#2404715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404715"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://github.com/opencontainers/selinux/pull/237",
"url": "https://github.com/opencontainers/selinux/pull/237"
}
],
"release_date": "2025-11-05T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T14:20:06+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2343"
},
{
"category": "workaround",
"details": "Potential mitigations for this issue include:\n\n* Using rootless containers, as doing so will block most of the inadvertent writes (runc would run with reduced privileges, making attempts to write to procfs files ineffective).\n* Based on our analysis, neither AppArmor or SELinux can protect against the full version of the redirected write attack. The container runtime is generally privileged enough to write to arbitrary procfs files, which is more than sufficient to cause a container breakout.",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects"
},
{
"cve": "CVE-2025-58183",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-29T23:01:50.573951+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2407258"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to be able to process a specially crafted GNU tar pax 1.0 archive with the application using the archive/tar package. Additionally, this issue can cause the Go application to allocate a large amount of memory, eventually leading to an out-of-memory condition and resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
],
"known_not_affected": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "RHBZ#2407258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2407258"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://go.dev/cl/709861",
"url": "https://go.dev/cl/709861"
},
{
"category": "external",
"summary": "https://go.dev/issue/75677",
"url": "https://go.dev/issue/75677"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI",
"url": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4014",
"url": "https://pkg.go.dev/vuln/GO-2025-4014"
}
],
"release_date": "2025-10-29T22:10:14.376000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T14:20:06+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2343"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x"
],
"known_not_affected": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T14:20:06+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.",
"product_ids": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2343"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:28804980ce7e4fb06e036547b6c53227802b257f1139220c2f19c16ed0cb8e53_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:2c9332fa68acce79d7defcec12c651d6d331a32208f4325e798cf37971a35fed_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:422d7e9ea2fefb525e116075247d56674738990d33cc4dedfe44ef40200989cf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-hypershift-velero-plugin-rhel9@sha256:947c0829fb3280fcead6c3292fcfec110d29656b7d3fdda9867600684f67b88c_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:0d7962f5278166bda2a3159deac215c5b201c21a10c504796d4048988f765e05_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:26dc2bc51a95d91b31a67796245fc42e8583ecc611ecff0bd1d427d0521ed735_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:cabb4436044c381f2cbedfb5fd7cfb0d4f03bd3724d5e4db79d6b6a290f4cd29_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9@sha256:d3e0f9f9317da506b4929a1e479631ade0473cb4e569d5e595e993f1ef99d96f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:77900c0379c2993dfdd4da3ca30461f2c3673d254d17b0b599f98daf16702fe1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:803c0eb52755db8d9a6940e85a79427e0747535b73549fab725e1fe5d3fb2589_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:a28dac3492fe6dd90a1d760e4c161acc4e29b14a0a344859ddb50c48002988c2_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-mustgather-rhel9@sha256:c0fa61e5a80abc4116ba7f11fa94ad73699cceaff0cd6d0ac17e909137b701b2_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:217ca8739c8d38583336f0989965289dbd2c05dfaa002cbad870373c6feff503_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:e80286b9d71393ad76c62fc1048178a2037111bedc51d221b90f9da45f43843a_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:f00ffbf59e1f851a29d3332f9624b370a1fd2aa8b9143bec45f25ecf38ef0612_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-non-admin-rhel9@sha256:facd76a98969b0697bba2073a2a608afaf15d7d219f6f4be7a7f5573e0ae4f2c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:3b961d901a3d90a397a7e123aaa166fdecc90c42b6a602b5de9cf4cd713dcabb_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:79e4fb695f7593c9768d8e5559a5af9cc1cb7ac80c5d683a58cf0fc37d1b2316_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:8e6e5f802c724895bd38499286166758fa64fbda287b6c400cd001e2074d3cf4_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-rhel9-operator@sha256:fb65a2767c9ce08f121f744c8f65b68f8848c945bd8f1f8b8bd0ab867b85abcc_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:15283059b3d528613a05de20e1020320327f309421bd1f757350a91c15663c6d_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:45c756febb37e224d613af1fd2945e9be6573d8ef3fd9784ffd634bb6f9c0f3f_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:c390357481b78a5bf5c8cc1e214a4302e8bdfb84319b95f64dbe83d045dcb715_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9@sha256:dd6fde5335758d1f215f437e9302e5c132bfa6e9d1c292b989448456116add9b_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8a981496fddc905ce17b167dbcae9a104ee161858f1e160e6e747c8261139240_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:8d7b969e6eba089a08c973044e1bb0ce4b4aee6e3af08c81fb6795aab8f4331c_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:939d14e803a96f2306ab289b9a2a25d87b28ac40bfbe348d3434e79ec651140a_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9@sha256:f98615e1feae82f8c1da343e3d22419be1ff03d7c9701c783a8385e5203f90a2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:0650e549ff736eb66bf63ef88aa5e423d8aa3e0dcf0f2b3a1a335154a688a930_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:12574a2b741b3383bee7ab518a2de0e7c57d4db91eb86872e53faab0253b89bf_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:39e62d665b020443d99bc4933f222b4579e076edcc2035c7e7af7b85062b4974_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-legacy-aws-rhel9@sha256:f2ee18730099a6df86ee2acd452b6f510dfeb16f6b026c315588dcd8dfc024bc_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:2c45039f786c313341c94619ed75372334c597353c848b02050f7399b03b54f9_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:815596c7b5d60f85a7f8e71f839a50662f5fde092bd9ce163f6ca5b57937b854_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:eb0b8d74e4bcbf3edfe32b7257301e00cebe7c5d0b5cd50e11ee253eef3f8665_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9@sha256:f4ad0d99ab545938dae4c7ed0dff245045a05cae60c8d32ea33a65f47a216c16_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:ac3b1cbabc2059fcee08c35973f1600c2b331d3486ef128fe21a5d90c3452fa2_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:cfca07fd8142801ccb031f920d1b79ef6a829aaf462c22d63be85c63e69cc32e_amd64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e0a41b70190e97bee2d5575d0bf5764cbfcc0214499649034e1fa664bb4b7c5f_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-plugin-rhel9@sha256:e3cad6aea8cb47853f1f0c8b0398b4a51221087c4f35d742fd896c93c2fa860d_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:152390ba6450e46063f3f6fc52008136e49e496992340542b432ddaf67c1b1d1_arm64",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:38e2d08523228de85ab16fb1a756183e7320ba14e1bd0ab2f4725eb060bbbd4a_ppc64le",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:432b45c01e99e4ea82fa2056a3947eb1900180c9c750ebf8a80122ab6852d427_s390x",
"OpenShift API for Data Protection 1.5:registry.redhat.io/oadp/oadp-velero-rhel9@sha256:e9532bac272f65a9aa4a529c6ef73cbd0a47308ada2104f286a10f66de5551e0_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:1017
Vulnerability from csaf_redhat - Published: 2026-01-22 15:47 - Updated: 2026-02-14 01:41Summary
Red Hat Security Advisory: Red Hat OpenShift GitOps v1.18.3 security update
Notes
Topic
Important: Red Hat OpenShift GitOps v1.18.3 security update
Details
An update is now available for Red Hat OpenShift GitOps.
Bug Fix(es) and Enhancement(s):
* GITOPS-8239 (CVE-2025-47913 openshift-gitops-1/gitops-rhel8: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS [gitops-1.18])
* GITOPS-8079 (CVE-2025-58183 openshift-gitops-1/argocd-rhel8: Unbounded allocation when parsing GNU sparse map [gitops-1.18])
* GITOPS-8082 (CVE-2025-58183 openshift-gitops-1/dex-rhel8: Unbounded allocation when parsing GNU sparse map [gitops-1.18])
* GITOPS-8522 (CVE-2025-68156 openshift-gitops-1/argocd-rhel8: Expr: Denial of Service via uncontrolled recursion in expression evaluation [gitops-1.18])
* GITOPS-8523 (CVE-2025-68156 openshift-gitops-1/argocd-rhel9: Expr: Denial of Service via uncontrolled recursion in expression evaluation [gitops-1.18])
* GITOPS-7849 (Cherry pick Repo Type Fix to Argo CD 3.1 stream)
* GITOPS-7992 (openshift-gitops-operator-metrics-monitor ServiceMonitor is attempting to use a bearerTokenFile configuration in its endpoints definition)
* GITOPS-8225 (RC 1.19.0-2 : haproxy replica remains 1 with HA upgrade)
* GITOPS-8249 (Prevent argoCD from automatically refreshing to gitops repository )
* GITOPS-8411 (CVE-2025-55190 still blocking due to github.com/argoproj/argo-cd/v2@v2.14.11 in gitops-rhel8:v1.18.1)
* GITOPS-8535 (Show All Namespaces or Current Namespace Only option)
* GITOPS-8591 (Reciving TargetDown after upgrading GitOps )
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Important: Red Hat OpenShift GitOps v1.18.3 security update",
"title": "Topic"
},
{
"category": "general",
"text": "An update is now available for Red Hat OpenShift GitOps.\nBug Fix(es) and Enhancement(s):\n* GITOPS-8239 (CVE-2025-47913 openshift-gitops-1/gitops-rhel8: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS [gitops-1.18])\n* GITOPS-8079 (CVE-2025-58183 openshift-gitops-1/argocd-rhel8: Unbounded allocation when parsing GNU sparse map [gitops-1.18])\n* GITOPS-8082 (CVE-2025-58183 openshift-gitops-1/dex-rhel8: Unbounded allocation when parsing GNU sparse map [gitops-1.18])\n* GITOPS-8522 (CVE-2025-68156 openshift-gitops-1/argocd-rhel8: Expr: Denial of Service via uncontrolled recursion in expression evaluation [gitops-1.18])\n* GITOPS-8523 (CVE-2025-68156 openshift-gitops-1/argocd-rhel9: Expr: Denial of Service via uncontrolled recursion in expression evaluation [gitops-1.18])\n* GITOPS-7849 (Cherry pick Repo Type Fix to Argo CD 3.1 stream)\n* GITOPS-7992 (openshift-gitops-operator-metrics-monitor ServiceMonitor is attempting to use a bearerTokenFile configuration in its endpoints definition)\n* GITOPS-8225 (RC 1.19.0-2 : haproxy replica remains 1 with HA upgrade)\n* GITOPS-8249 (Prevent argoCD from automatically refreshing to gitops repository )\n* GITOPS-8411 (CVE-2025-55190 still blocking due to github.com/argoproj/argo-cd/v2@v2.14.11 in gitops-rhel8:v1.18.1)\n* GITOPS-8535 (Show All Namespaces or Current Namespace Only option)\n* GITOPS-8591 (Reciving TargetDown after upgrading GitOps )",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1017",
"url": "https://access.redhat.com/errata/RHSA-2026:1017"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13888",
"url": "https://access.redhat.com/security/cve/CVE-2025-13888"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47913",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-55190",
"url": "https://access.redhat.com/security/cve/CVE-2025-55190"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58183",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68156",
"url": "https://access.redhat.com/security/cve/CVE-2025-68156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_openshift_gitops/1.18/",
"url": "https://docs.redhat.com/en/documentation/red_hat_openshift_gitops/1.18/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1017.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift GitOps v1.18.3 security update",
"tracking": {
"current_release_date": "2026-02-14T01:41:12+00:00",
"generator": {
"date": "2026-02-14T01:41:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1017",
"initial_release_date": "2026-01-22T15:47:03+00:00",
"revision_history": [
{
"date": "2026-01-22T15:47:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-23T04:51:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-14T01:41:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift GitOps 1.18",
"product": {
"name": "Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_gitops:1.18::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift GitOps"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3Addc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881087"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881232"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3A32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881701"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768880997"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881228"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3Aae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768882111"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3Aed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768882258"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3A1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881034"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3A3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881033"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-operator-bundle@sha256%3Aa4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768883693"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3A4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768880947"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3Ad529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881087"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881232"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3A1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881701"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768880997"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881228"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3A6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768882111"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3Aa0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768882258"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3A7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881034"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3A10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881033"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3A54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768880947"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3Af87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881087"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3Af8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881232"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3Aa621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881701"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768880997"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881228"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3Ab6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768882111"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3Aab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768882258"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3A853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881034"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3A43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881033"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3A376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768880947"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3A58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881087"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3Aa333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881232"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3Aa6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881701"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768880997"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881228"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3Abca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768882111"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3A792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768882258"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3A1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881034"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3Ae73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768881033"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3Ade7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768880947"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13888",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"discovery_date": "2025-12-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418361"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenShift GitOps. Namespace admins can create ArgoCD Custom Resources (CRs) that trick the system into granting them elevated permissions in other namespaces, including privileged namespaces. An authenticated attacker can then use these elevated permissions to create privileged workloads that run on master nodes, effectively giving them root access to the entire cluster.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openshift-gitops-operator: OpenShift GitOps: Namespace Admin Cluster Takeover via Privileged Jobs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat rates this vulnerability as Important instead of Critical. While full cluster compromise is possible, it requires the attacker to already possess authenticated namespace administrator credentials, reducing the attack surface to authorized internal users rather than external attackers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13888"
},
{
"category": "external",
"summary": "RHBZ#2418361",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418361"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13888"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13888",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13888"
},
{
"category": "external",
"summary": "https://github.com/redhat-developer/gitops-operator/commit/bc6ac3e03d7c8b3db5d8f1770c868396a4c2dcef",
"url": "https://github.com/redhat-developer/gitops-operator/commit/bc6ac3e03d7c8b3db5d8f1770c868396a4c2dcef"
},
{
"category": "external",
"summary": "https://github.com/redhat-developer/gitops-operator/pull/897",
"url": "https://github.com/redhat-developer/gitops-operator/pull/897"
},
{
"category": "external",
"summary": "https://github.com/redhat-developer/gitops-operator/releases/tag/v1.16.2",
"url": "https://github.com/redhat-developer/gitops-operator/releases/tag/v1.16.2"
}
],
"release_date": "2025-12-15T13:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:47:03+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1017"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openshift-gitops-operator: OpenShift GitOps: Namespace Admin Cluster Takeover via Privileged Jobs"
},
{
"cve": "CVE-2025-47913",
"discovery_date": "2025-11-13T22:01:26.092452+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414943"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic(\"unreachable\") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling\u2014or intercepting\u2014SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into \u201cunreachable\u201d code paths instead of being handled gracefully\u2014making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "RHBZ#2414943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hcg3-q754-cr77",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"category": "external",
"summary": "https://go.dev/cl/700295",
"url": "https://go.dev/cl/700295"
},
{
"category": "external",
"summary": "https://go.dev/issue/75178",
"url": "https://go.dev/issue/75178"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4116",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"release_date": "2025-11-13T21:29:39.907000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:47:03+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1017"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS"
},
{
"cve": "CVE-2025-55190",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2025-08-21T07:09:49.658000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2390026"
}
],
"notes": [
{
"category": "description",
"text": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. In versions 2.13.0 through 2.13.8, 2.14.0 through 2.14.15, 3.0.0 through 3.0.12 and 3.1.0-rc1 through 3.1.1, API tokens with project-level permissions are able to retrieve sensitive repository credentials (usernames, passwords) through the project details API endpoint, even when the token only has standard application management permissions and no explicit access to secrets. This vulnerability does not only affect project-level permissions. Any token with project get permissions is also vulnerable, including global permissions such as: `p, role/user, projects, get, *, allow`. This issue is fixed in versions 2.13.9, 2.14.16, 3.0.14 and 3.1.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/argoproj/argo-cd: Project API Token Exposes Repository Credentials",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has Important impact as exploitation requires some privileges granted by the system. An attacker would either need the ability to create an API token (via having valid login credentials) or to have stolen an API token from a legitimate user. It does not grant full control over the system, attackers can only tamper with the project(s) associated with an API token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55190"
},
{
"category": "external",
"summary": "RHBZ#2390026",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2390026"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55190"
},
{
"category": "external",
"summary": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-786q-9hcg-v9ff",
"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-786q-9hcg-v9ff"
}
],
"release_date": "2025-09-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:47:03+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1017"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/argoproj/argo-cd: Project API Token Exposes Repository Credentials"
},
{
"cve": "CVE-2025-58183",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-29T23:01:50.573951+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2407258"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to be able to process a specially crafted GNU tar pax 1.0 archive with the application using the archive/tar package. Additionally, this issue can cause the Go application to allocate a large amount of memory, eventually leading to an out-of-memory condition and resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "RHBZ#2407258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2407258"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://go.dev/cl/709861",
"url": "https://go.dev/cl/709861"
},
{
"category": "external",
"summary": "https://go.dev/issue/75677",
"url": "https://go.dev/issue/75677"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI",
"url": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4014",
"url": "https://pkg.go.dev/vuln/GO-2025-4014"
}
],
"release_date": "2025-10-29T22:10:14.376000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:47:03+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1017"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:47:03+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1017"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68156",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-16T19:01:42.049157+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2422891"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Expr, an expression language and expression evaluation for Go. This vulnerability allows a denial of service (DoS) via recursive traversal over user-provided deeply nested or cyclic data structures without enforcing a maximum recursion depth, leading to a stack overflow panic and application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/expr-lang/expr: Expr: Denial of Service via uncontrolled recursion in expression evaluation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products utilizing the `Expr` Go library because it can lead to a denial-of-service. Exploitation requires an application to evaluate expressions against untrusted or insufficiently validated data structures containing deeply nested or cyclic references, which can cause a stack overflow and application crash. Products that do not process untrusted input with `Expr` are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68156"
},
{
"category": "external",
"summary": "RHBZ#2422891",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2422891"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68156"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68156",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68156"
},
{
"category": "external",
"summary": "https://github.com/expr-lang/expr/pull/870",
"url": "https://github.com/expr-lang/expr/pull/870"
},
{
"category": "external",
"summary": "https://github.com/expr-lang/expr/security/advisories/GHSA-cfpf-hrx2-8rv6",
"url": "https://github.com/expr-lang/expr/security/advisories/GHSA-cfpf-hrx2-8rv6"
}
],
"release_date": "2025-12-16T18:24:11.648000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:47:03+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1017"
},
{
"category": "workaround",
"details": "To mitigate this issue, applications using the `Expr` library should ensure that evaluation environments do not contain cyclic references. Additionally, externally supplied data structures must be validated or sanitized before being passed to `Expr` for evaluation. As a last-resort defensive measure, expression evaluation can be wrapped with panic recovery to prevent a full process crash.",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:58b596569b8de68d7474d949fd30d9a1666f1f08ea81e8264b9132263b61377b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:d529b4bbae3cfcf25ea91a29d3c9eb701ef6a3a54e6e0c0117c649f3e4dbe2dc_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:ddc27dbea59c611ffb5394114a6c754397cc0032ba3487a3f03041ed34cfce30_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:f87ac5bb84230c4c34f5404adbc45347a295fb1e60095c2e4ad1e0ea126382b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:1ac33bdd539b1bf2033e27f3127badf1afd2d5fdeef9fd51f00feeffdd936f32_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:32ae33eb3d84b30020cb6732e5c84f76cbd2de6abdd7b42e72be887015c49d35_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a6141b3b5508dc9690ae15ebc3efd33a3fc71382a7dd449a954ffe181f8cd138_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a621f4cfd83907d57317ce941f470ba4b0fb5d599aab38db936e591dde426404_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:0330e4aab6eb9d7c54417d2a6c5aaf959319eb1c811ab91085570295dc19b258_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:259bb75abc6b464d9badf8b110ab239232152010ada0c407241fab47ecbbae6e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:571c6d9d4e84c6fcd278e13f15e71b527b618ac7d98c477c516d91e0097ba40c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:8286093133d109fe0d852491fda66c66d893527f3364c587b6d09823088bcba6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0eb572fc96ae2e1973ce43515f03121965600bb09ef0b995eb467f5965c2246c_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1438757fd131c12d8ae3a1edb5757bc63114b882d00563be2857917611008418_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:a333f6b8ae405b22c746a02bd38a125753a347e7e2c352ec690fa97388b3a40b_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f8d8f51bd4aeba9dcfd4edad0720410d289ac0e7a2642c90128d506d69d42c77_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:0f883371ffee9d87547a4dc9524a35c5e6cce840a722bf3a01b1be3c1396fdb1_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:6e8d1e3c7bee9c2c2bee357af24bae34510fe6b87075b98f5be34e41dd70d152_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:779c33c3679e47ebca0af343ba6e26d2723cfc9affdcee4df54078ef68278016_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:88d55cc7ec87db114cc60c9c7a67e9c6a69aae69c30a6c076bd94f239a84498c_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:6f16630ff37a5e18b5f8eee782edd6ada351a60b41fdab1bbfda27ebb297135a_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:ae7a2d5c703f6caa7d4facffe3c141bed9739b88967f5a832cf9005b2f815561_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:b6c961fab1178fcc25126ac214d0a7e15bf5738291e2e16c4e05ec320e54fcca_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:bca47a6bb7edb70b24927ea02484c91bc4ce35cc8ebb24f5d68cb28193e77fda_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:792cbe51a6e0f80d9a97b5a6a538a36f756467624144ad3af2c2da53f85db68c_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:a0236e0cf364d15553a77f0c12f8f8c0bb12ebf2c49c43c68da4f3f28b93e781_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ab7de39ebdcc363fe61d919ebf430d6e533ddc108075c19f9c9e6d71938bfd6e_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ed37ac2ef10a9107672556fe62e19020d470745a0ec04378ed840949c49a6234_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:a4e9887db8647c4e958df4725f08340a9c6a462cd18fd2bf9c9f1fc939649740_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:10aa721d5a3c55fad979603898fa3b5d504c4911559b8615edfce9a5d0653ff0_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:3cde1fe9926ec2d6d7618cee7a053b1f66c8ebe1a5f6d9e097914b3d3d6f8ca1_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:43ba408b8ed58259bf338fd29260d936fbde9846f772d0580b3e7486ef8ea300_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e73fa4b644e17e520cc9836d4b235a5ae02e10a6a21addc2ae959832d4e08143_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1992f4b3414b6955295827e06e8e5e635f754eb3e0b52ca181e80add613d1ba4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:1cbde70be8f1035b0f45b02e0663c28aa444ea5bc2c8bca580ff164dcfff4196_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7fbb7d98b130e1dc6c9f5f440244a05bff22e34ab70f5e57e45d4b70e4e3f8da_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:853107e7329e189ded3fc5ca657366e27010f468b1be813264efd9e2cf90c906_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:376ef09554debe6042424f2b4464922cf1aeb14d801fea5c81900d24ce028a39_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:4bb1a9bd246dac5d17ea6bb1556d7ebb87e794369f75913d3d197d2c55a48015_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54a92917be83722915ce05181652988342015eeb3e54fa3b4dd226d6fd493ccd_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:de7cde72fcb72eccc9f5ea89eed7094e4c976c3e331c48ef450339323a326da1_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/expr-lang/expr: Expr: Denial of Service via uncontrolled recursion in expression evaluation"
}
]
}
RHSA-2026:1018
Vulnerability from csaf_redhat - Published: 2026-01-22 15:52 - Updated: 2026-02-14 01:41Summary
Red Hat Security Advisory: Red Hat OpenShift GitOps v1.17.4 security update
Notes
Topic
Important: Red Hat OpenShift GitOps v1.17.4 security update
Details
An update is now available for Red Hat OpenShift GitOps.
Bug Fix(es) and Enhancement(s):
* GITOPS-8231 (CVE-2025-47913 openshift-gitops-1/argocd-agent-rhel8: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS [gitops-1.17])
* GITOPS-8233 (CVE-2025-47913 openshift-gitops-1/argocd-rhel9: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS [gitops-1.17])
* GITOPS-8078 (CVE-2025-58183 openshift-gitops-1/argocd-rhel8: Unbounded allocation when parsing GNU sparse map [gitops-1.17])
* GITOPS-8081 (CVE-2025-58183 openshift-gitops-1/dex-rhel8: Unbounded allocation when parsing GNU sparse map [gitops-1.17])
* GITOPS-7753 (CVE-2025-58754 openshift-gitops-1/argocd-extensions-rhel8: Axios DoS via lack of data size check [gitops-1.17])
* GITOPS-8511 (CVE-2025-68156 openshift-gitops-1/argocd-rhel8: Expr: Denial of Service via uncontrolled recursion in expression evaluation [gitops-1.17])
* GITOPS-8512 (CVE-2025-68156 openshift-gitops-1/argocd-rhel9: Expr: Denial of Service via uncontrolled recursion in expression evaluation [gitops-1.17])
* GITOPS-7568 (ignoreDifferences setting is not honored for OAuthClient resource)
* GITOPS-7992 (openshift-gitops-operator-metrics-monitor ServiceMonitor is attempting to use a bearerTokenFile configuration in its endpoints definition)
* GITOPS-8225 (RC 1.19.0-2 : haproxy replica remains 1 with HA upgrade)
* GITOPS-8411 (CVE-2025-55190 still blocking due to github.com/argoproj/argo-cd/v2@v2.14.11 in gitops-rhel8:v1.18.1)
* GITOPS-8591 (Reciving TargetDown after upgrading GitOps )
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Important: Red Hat OpenShift GitOps v1.17.4 security update",
"title": "Topic"
},
{
"category": "general",
"text": "An update is now available for Red Hat OpenShift GitOps.\nBug Fix(es) and Enhancement(s):\n* GITOPS-8231 (CVE-2025-47913 openshift-gitops-1/argocd-agent-rhel8: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS [gitops-1.17])\n* GITOPS-8233 (CVE-2025-47913 openshift-gitops-1/argocd-rhel9: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS [gitops-1.17])\n* GITOPS-8078 (CVE-2025-58183 openshift-gitops-1/argocd-rhel8: Unbounded allocation when parsing GNU sparse map [gitops-1.17])\n* GITOPS-8081 (CVE-2025-58183 openshift-gitops-1/dex-rhel8: Unbounded allocation when parsing GNU sparse map [gitops-1.17])\n* GITOPS-7753 (CVE-2025-58754 openshift-gitops-1/argocd-extensions-rhel8: Axios DoS via lack of data size check [gitops-1.17])\n* GITOPS-8511 (CVE-2025-68156 openshift-gitops-1/argocd-rhel8: Expr: Denial of Service via uncontrolled recursion in expression evaluation [gitops-1.17])\n* GITOPS-8512 (CVE-2025-68156 openshift-gitops-1/argocd-rhel9: Expr: Denial of Service via uncontrolled recursion in expression evaluation [gitops-1.17])\n* GITOPS-7568 (ignoreDifferences setting is not honored for OAuthClient resource)\n* GITOPS-7992 (openshift-gitops-operator-metrics-monitor ServiceMonitor is attempting to use a bearerTokenFile configuration in its endpoints definition)\n* GITOPS-8225 (RC 1.19.0-2 : haproxy replica remains 1 with HA upgrade)\n* GITOPS-8411 (CVE-2025-55190 still blocking due to github.com/argoproj/argo-cd/v2@v2.14.11 in gitops-rhel8:v1.18.1)\n* GITOPS-8591 (Reciving TargetDown after upgrading GitOps )",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1018",
"url": "https://access.redhat.com/errata/RHSA-2026:1018"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47913",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-55190",
"url": "https://access.redhat.com/security/cve/CVE-2025-55190"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58183",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58754",
"url": "https://access.redhat.com/security/cve/CVE-2025-58754"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68156",
"url": "https://access.redhat.com/security/cve/CVE-2025-68156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_openshift_gitops/1.17/",
"url": "https://docs.redhat.com/en/documentation/red_hat_openshift_gitops/1.17/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1018.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift GitOps v1.17.4 security update",
"tracking": {
"current_release_date": "2026-02-14T01:41:12+00:00",
"generator": {
"date": "2026-02-14T01:41:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1018",
"initial_release_date": "2026-01-22T15:52:24+00:00",
"revision_history": [
{
"date": "2026-01-22T15:52:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-23T04:51:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-14T01:41:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift GitOps 1.17",
"product": {
"name": "Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_gitops:1.17::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift GitOps"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3Ac1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825455"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3Af5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825762"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3A8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824729"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824533"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824532"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3Af626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824983"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3Ab5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825799"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3Ad12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824960"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3A1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825193"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-operator-bundle@sha256%3A710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768828150"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3Ae76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824197"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3A5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825455"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825762"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3Aa922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824729"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824533"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824532"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3A54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824983"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3Ac89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825799"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3Ac8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824960"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3Abc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825193"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3A8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824197"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3A04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825455"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825762"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3A309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824729"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824533"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824532"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3Acf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824983"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3A495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825799"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3Ae7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824960"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3Ac8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825193"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3A3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824197"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3A42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825455"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825762"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3A38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824729"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824533"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824532"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3A81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824983"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3A072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825799"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3A809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824960"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3A4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768825193"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3Adab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1768824197"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64 as a component of Red Hat OpenShift GitOps 1.17",
"product_id": "Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.17"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47913",
"discovery_date": "2025-11-13T22:01:26.092452+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414943"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic(\"unreachable\") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling\u2014or intercepting\u2014SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into \u201cunreachable\u201d code paths instead of being handled gracefully\u2014making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "RHBZ#2414943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hcg3-q754-cr77",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"category": "external",
"summary": "https://go.dev/cl/700295",
"url": "https://go.dev/cl/700295"
},
{
"category": "external",
"summary": "https://go.dev/issue/75178",
"url": "https://go.dev/issue/75178"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4116",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"release_date": "2025-11-13T21:29:39.907000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:52:24+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1018"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS"
},
{
"cve": "CVE-2025-55190",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2025-08-21T07:09:49.658000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2390026"
}
],
"notes": [
{
"category": "description",
"text": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. In versions 2.13.0 through 2.13.8, 2.14.0 through 2.14.15, 3.0.0 through 3.0.12 and 3.1.0-rc1 through 3.1.1, API tokens with project-level permissions are able to retrieve sensitive repository credentials (usernames, passwords) through the project details API endpoint, even when the token only has standard application management permissions and no explicit access to secrets. This vulnerability does not only affect project-level permissions. Any token with project get permissions is also vulnerable, including global permissions such as: `p, role/user, projects, get, *, allow`. This issue is fixed in versions 2.13.9, 2.14.16, 3.0.14 and 3.1.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/argoproj/argo-cd: Project API Token Exposes Repository Credentials",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has Important impact as exploitation requires some privileges granted by the system. An attacker would either need the ability to create an API token (via having valid login credentials) or to have stolen an API token from a legitimate user. It does not grant full control over the system, attackers can only tamper with the project(s) associated with an API token.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55190"
},
{
"category": "external",
"summary": "RHBZ#2390026",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2390026"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55190"
},
{
"category": "external",
"summary": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-786q-9hcg-v9ff",
"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-786q-9hcg-v9ff"
}
],
"release_date": "2025-09-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:52:24+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1018"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/argoproj/argo-cd: Project API Token Exposes Repository Credentials"
},
{
"cve": "CVE-2025-58183",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-29T23:01:50.573951+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2407258"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to be able to process a specially crafted GNU tar pax 1.0 archive with the application using the archive/tar package. Additionally, this issue can cause the Go application to allocate a large amount of memory, eventually leading to an out-of-memory condition and resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "RHBZ#2407258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2407258"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://go.dev/cl/709861",
"url": "https://go.dev/cl/709861"
},
{
"category": "external",
"summary": "https://go.dev/issue/75677",
"url": "https://go.dev/issue/75677"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI",
"url": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4014",
"url": "https://pkg.go.dev/vuln/GO-2025-4014"
}
],
"release_date": "2025-10-29T22:10:14.376000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:52:24+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1018"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map"
},
{
"cve": "CVE-2025-58754",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-09-12T02:00:53.897605+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2394735"
}
],
"notes": [
{
"category": "description",
"text": "Axios is a promise based HTTP client for the browser and Node.js. When Axios starting in version 0.28.0 and prior to versions 0.30.2 and 1.12.0 runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response. This path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested `responseType: \u0027stream\u0027`. Versions 0.30.2 and 1.12.0 contain a patch for the issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "axios: Axios DoS via lack of data size check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Availability impact is limited to the application which bundles axios and not the host Red Hat system.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58754"
},
{
"category": "external",
"summary": "RHBZ#2394735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394735"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58754"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593",
"url": "https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/pull/7011",
"url": "https://github.com/axios/axios/pull/7011"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/releases/tag/v1.12.0",
"url": "https://github.com/axios/axios/releases/tag/v1.12.0"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj",
"url": "https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj"
}
],
"release_date": "2025-09-12T01:16:40.513000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:52:24+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1018"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "axios: Axios DoS via lack of data size check"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:52:24+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1018"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68156",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-16T19:01:42.049157+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2422891"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Expr, an expression language and expression evaluation for Go. This vulnerability allows a denial of service (DoS) via recursive traversal over user-provided deeply nested or cyclic data structures without enforcing a maximum recursion depth, leading to a stack overflow panic and application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/expr-lang/expr: Expr: Denial of Service via uncontrolled recursion in expression evaluation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products utilizing the `Expr` Go library because it can lead to a denial-of-service. Exploitation requires an application to evaluate expressions against untrusted or insufficiently validated data structures containing deeply nested or cyclic references, which can cause a stack overflow and application crash. Products that do not process untrusted input with `Expr` are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68156"
},
{
"category": "external",
"summary": "RHBZ#2422891",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2422891"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68156"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68156",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68156"
},
{
"category": "external",
"summary": "https://github.com/expr-lang/expr/pull/870",
"url": "https://github.com/expr-lang/expr/pull/870"
},
{
"category": "external",
"summary": "https://github.com/expr-lang/expr/security/advisories/GHSA-cfpf-hrx2-8rv6",
"url": "https://github.com/expr-lang/expr/security/advisories/GHSA-cfpf-hrx2-8rv6"
}
],
"release_date": "2025-12-16T18:24:11.648000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T15:52:24+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1018"
},
{
"category": "workaround",
"details": "To mitigate this issue, applications using the `Expr` library should ensure that evaluation environments do not contain cyclic references. Additionally, externally supplied data structures must be validated or sanitized before being passed to `Expr` for evaluation. As a last-resort defensive measure, expression evaluation can be wrapped with panic recovery to prevent a full process crash.",
"product_ids": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:04a0309f1ea64b27a03d51ed435e3ba03b9b1c00f92ef1d136db7873be49bf6c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:42bcfb29916b6c0ed25625841c9dd483b1a36cd978c6815a2969a794417474b0_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5cd9912e51ffea57bad97d8d725cd6210c0ba43d41d6a11c67b03d7e8807a1b4_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:c1061a246650fe9735d3c5b439fb81e859e5badcd69c4ea241204287e14ec802_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:309b422848a3c58a2f6716b2ae7891fae31a2bee824dddf2206d3ee4d9c0e3be_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:38252c3097bc6ac5971aff8ca9c9280a5569b8824a96034cddeff4a2feed9354_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:8a07b1dcc21b99093a21936da2959f4ff9dbe9b2a138609594ec1cbfab06d096_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:a922ecfd9f8d0cbc42897871235789c5f60dfeef43487697152acd492da2ba52_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:221e413f5a21ae4a8eb3a92c88a0f901980fb022f43c5c9dd0b618cb8d94f12f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:6dbc097f05deedeb5a1242bcbbbd71a32f7280e60d65ba0773b36f83b98bcd31_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:752863bfda3f6021ffbb356696049b7983dec9556da06f2c5e653fa9244a2b25_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:95db3bb5baeea65a0304c1701ae7f84b9431fc1f13f7c18085abc82d5a7eace1_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:0afd39c2275c46025cee7518d62cc3a26441758f9315e864d25f8b78a5e464f4_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:1f93ea9508e4f1a9c54158d8fa6a0dc7babb65fcbd606c3474fd953fc80e95c9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7bec6ba526ade9f626672e69d9b4a22df5a4d5d6b65a3d7fd681055968e85db8_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f5b3f576f18c0687c5cb757d8c7420ca883033975b906cd2c6fabace582a7fdd_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:19ee8d67235801b83af21c52b92b0855e34f959700eb400d2db455a50b91f512_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2946fd417176936f3339cbbb3597d45f586357e68810d8449e716fb827f5debb_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:8019ec0d2ecc069941d771369cd072c656532aa7bff4a15ba0f62e4d0545992e_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:80f845196a254e186385aa8c0217bfd857a1832357bc309875b6b82a835eadee_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:54cf6dad43d830b530b6554c25f24b23be3bb51fc9436b20fc4c75fa03665b84_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:81f57cf09f298ba6436d9f3236d53210de456b8b1e54b565788b15b7a9d48411_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:cf87bc59b51519af1fb349291dc6e0e346c22db132ab8ed2b0efd49e2a1f9775_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f626986471cf481e3101377242474d3904439fa12ed45b9dd49cb1d369390c65_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:072fc7738b1bd7fdfacc99eafc7fe55dfa3ebfb79466f255401b821391667971_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:495cfc1e0b1112d6d534baacda0d5591b67af1123b7099a65514365226b8874d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:b5ef707dee8e0098612e5117b8e5baaebb959c75a0416624d727dd44106c401b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c89915b32d7812867b049c754480667c6218738d81fceb7012a615928508d62d_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:710f6fe3896177cae0d900643b7147d11410e5e58ee012e139fbeee308ee297b_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:1fdc8378e3f67e274146571a566c49a99069964e167e7915fa078d508cedf388_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4a9f42b315becd846787de8798c2bb85d3a2bf607dacd85a18976fa16c00302d_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:bc068cd4d0d2a6c9bae530b3343cfc31ff19e109b70021ef260bb87548a9c1b9_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:c8cca109f73568bd4331ecab567ba39a5d016bfd249bc6e62c79eb903df7f77d_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:809292e8911468c8b463736793bc42adb6e9d886d7a3a3452706668091f22b20_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:c8c274929641a8ddcbd8045daee04d1cc4f361acd4e9891b43718acef88ea842_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d12e12f7aa0f40272033174000422448695ccaa5f5331624144be0506e3f2475_amd64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:e7a5ca5641b9c72d42b39b087a9277183a2767e326914ea0441ce5904a77b44f_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:3a7697e1f5e899b15e86d98c813857a5513055dbb8202f082ebcd1c1e91e7e2c_ppc64le",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:8d10a7ccbb3ef67f3f5ad3f4dd77927a6ab15b7bdb78cf821ee764f967adcdc2_arm64",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:dab0ffcf048536d127483cce2042665a687086d72ce420ecca6dba3e3787f339_s390x",
"Red Hat OpenShift GitOps 1.17:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:e76acb4eff779bd17f575e3535cf8be658205fe1e7bc14c67a4f26110c4f8c5f_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/expr-lang/expr: Expr: Denial of Service via uncontrolled recursion in expression evaluation"
}
]
}
RHSA-2026:2571
Vulnerability from csaf_redhat - Published: 2026-02-11 15:58 - Updated: 2026-02-14 01:42Summary
Red Hat Security Advisory: multicluster engine for Kubernetes v2.9.2 security update
Notes
Topic
The multicluster engine for Kubernetes 2.9 General Availability release images,
which add new features and enhancements, bug fixes, and updated container images.
Details
The multicluster engine for Kubernetes v2.9 images
The multicluster engine for Kubernetes provides the foundational components
that are necessary for the centralized management of multiple
Kubernetes-based clusters across data centers, public clouds, and private
clouds.
You can use the engine to create new Red Hat OpenShift Container Platform
clusters or to bring existing Kubernetes-based clusters under management by
importing them. After the clusters are managed, you can use the APIs that
are provided by the engine to distribute configuration based on placement
policy.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The multicluster engine for Kubernetes 2.9 General Availability release images,\nwhich add new features and enhancements, bug fixes, and updated container images.",
"title": "Topic"
},
{
"category": "general",
"text": "The multicluster engine for Kubernetes v2.9 images\n\nThe multicluster engine for Kubernetes provides the foundational components\nthat are necessary for the centralized management of multiple\nKubernetes-based clusters across data centers, public clouds, and private\nclouds.\n\nYou can use the engine to create new Red Hat OpenShift Container Platform\nclusters or to bring existing Kubernetes-based clusters under management by\nimporting them. After the clusters are managed, you can use the APIs that\nare provided by the engine to distribute configuration based on placement\npolicy.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2571",
"url": "https://access.redhat.com/errata/RHSA-2026:2571"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47907",
"url": "https://access.redhat.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58183",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58190",
"url": "https://access.redhat.com/security/cve/CVE-2025-58190"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2571.json"
}
],
"title": "Red Hat Security Advisory: multicluster engine for Kubernetes v2.9.2 security update",
"tracking": {
"current_release_date": "2026-02-14T01:42:34+00:00",
"generator": {
"date": "2026-02-14T01:42:34+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2571",
"initial_release_date": "2026-02-11T15:58:30+00:00",
"revision_history": [
{
"date": "2026-02-11T15:58:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-11T15:58:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-14T01:42:34+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "multicluster engine for Kubernetes 2.9",
"product": {
"name": "multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:multicluster_engine:2.9::el9"
}
}
}
],
"category": "product_family",
"name": "multicluster engine for Kubernetes"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:cc10845b259f7ac1cae5b254e090d52fb9278c89d07b0b7d44a8f6f704ec6272_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:cc10845b259f7ac1cae5b254e090d52fb9278c89d07b0b7d44a8f6f704ec6272_amd64",
"product_id": "registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:cc10845b259f7ac1cae5b254e090d52fb9278c89d07b0b7d44a8f6f704ec6272_amd64",
"product_identification_helper": {
"purl": "pkg:oci/addon-manager-rhel9@sha256%3Acc10845b259f7ac1cae5b254e090d52fb9278c89d07b0b7d44a8f6f704ec6272?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769693820"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:fea7a807792063cafdd6196fc68e8f7b693d7f123241c6bd64f4a00050f4a5ef_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:fea7a807792063cafdd6196fc68e8f7b693d7f123241c6bd64f4a00050f4a5ef_amd64",
"product_id": "registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:fea7a807792063cafdd6196fc68e8f7b693d7f123241c6bd64f4a00050f4a5ef_amd64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel9@sha256%3Afea7a807792063cafdd6196fc68e8f7b693d7f123241c6bd64f4a00050f4a5ef?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770594104"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:a498c21c46341a168e51b133e07cd390d7440c3d949ac4107cd829c5b30a4614_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:a498c21c46341a168e51b133e07cd390d7440c3d949ac4107cd829c5b30a4614_amd64",
"product_id": "registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:a498c21c46341a168e51b133e07cd390d7440c3d949ac4107cd829c5b30a4614_amd64",
"product_identification_helper": {
"purl": "pkg:oci/backplane-rhel9-operator@sha256%3Aa498c21c46341a168e51b133e07cd390d7440c3d949ac4107cd829c5b30a4614?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770302751"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:4285f5036dcf7311bc378bbe350dc33759254999de205929de90a9d218d32f78_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:4285f5036dcf7311bc378bbe350dc33759254999de205929de90a9d218d32f78_amd64",
"product_id": "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:4285f5036dcf7311bc378bbe350dc33759254999de205929de90a9d218d32f78_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-agent-rhel9@sha256%3A4285f5036dcf7311bc378bbe350dc33759254999de205929de90a9d218d32f78?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770104648"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:adfeb1a43a5b626519d6c0aee7cd7986d5afd349a4fae37d0e8821667f7fc6d3_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:adfeb1a43a5b626519d6c0aee7cd7986d5afd349a4fae37d0e8821667f7fc6d3_amd64",
"product_id": "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:adfeb1a43a5b626519d6c0aee7cd7986d5afd349a4fae37d0e8821667f7fc6d3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-kubevirt-rhel9@sha256%3Aadfeb1a43a5b626519d6c0aee7cd7986d5afd349a4fae37d0e8821667f7fc6d3?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770190066"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:6eec1cff0d514e343599e9c3ca7b7aa2cbff307a28e45b19364a534be4f89dd1_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:6eec1cff0d514e343599e9c3ca7b7aa2cbff307a28e45b19364a534be4f89dd1_amd64",
"product_id": "registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:6eec1cff0d514e343599e9c3ca7b7aa2cbff307a28e45b19364a534be4f89dd1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/capoa-bootstrap-rhel9@sha256%3A6eec1cff0d514e343599e9c3ca7b7aa2cbff307a28e45b19364a534be4f89dd1?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770710226"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:7b5496adbf0b53964790dbb22c468161e6d873912eacd00b08b955c1314d52a8_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:7b5496adbf0b53964790dbb22c468161e6d873912eacd00b08b955c1314d52a8_amd64",
"product_id": "registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:7b5496adbf0b53964790dbb22c468161e6d873912eacd00b08b955c1314d52a8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/capoa-control-plane-rhel9@sha256%3A7b5496adbf0b53964790dbb22c468161e6d873912eacd00b08b955c1314d52a8?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770710226"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:b7b9c35577b5a91539597fa90c6187e20cdbad70e8ddc55c8dc80058759be711_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:b7b9c35577b5a91539597fa90c6187e20cdbad70e8ddc55c8dc80058759be711_amd64",
"product_id": "registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:b7b9c35577b5a91539597fa90c6187e20cdbad70e8ddc55c8dc80058759be711_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mce-capi-webhook-config-rhel9@sha256%3Ab7b9c35577b5a91539597fa90c6187e20cdbad70e8ddc55c8dc80058759be711?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770667801"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:cc587469525f61858f261cfbf862608aab1509bf3cf5c1e43aea63a19e579728_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:cc587469525f61858f261cfbf862608aab1509bf3cf5c1e43aea63a19e579728_amd64",
"product_id": "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:cc587469525f61858f261cfbf862608aab1509bf3cf5c1e43aea63a19e579728_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-curator-controller-rhel9@sha256%3Acc587469525f61858f261cfbf862608aab1509bf3cf5c1e43aea63a19e579728?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769895731"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:a6950372d2ab44e865938a37f5c2dfdd55bf02cec1575353538dd28b016700f4_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:a6950372d2ab44e865938a37f5c2dfdd55bf02cec1575353538dd28b016700f4_amd64",
"product_id": "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:a6950372d2ab44e865938a37f5c2dfdd55bf02cec1575353538dd28b016700f4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-image-set-controller-rhel9@sha256%3Aa6950372d2ab44e865938a37f5c2dfdd55bf02cec1575353538dd28b016700f4?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769721748"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:60751156b9a51d18668dee969963569a998172b0577acaeaecff52970f3c0957_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:60751156b9a51d18668dee969963569a998172b0577acaeaecff52970f3c0957_amd64",
"product_id": "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:60751156b9a51d18668dee969963569a998172b0577acaeaecff52970f3c0957_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-addon-rhel9@sha256%3A60751156b9a51d18668dee969963569a998172b0577acaeaecff52970f3c0957?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770364471"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:a3f0cde47e922823ca537e0de8c7ddfed7422be5282e137e4db04d4e3c748104_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:a3f0cde47e922823ca537e0de8c7ddfed7422be5282e137e4db04d4e3c748104_amd64",
"product_id": "registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:a3f0cde47e922823ca537e0de8c7ddfed7422be5282e137e4db04d4e3c748104_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-rhel9@sha256%3Aa3f0cde47e922823ca537e0de8c7ddfed7422be5282e137e4db04d4e3c748104?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769752462"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a9871b54bfa689489d578155adb5a483cab73e202c092619e116e71efb476c00_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a9871b54bfa689489d578155adb5a483cab73e202c092619e116e71efb476c00_amd64",
"product_id": "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a9871b54bfa689489d578155adb5a483cab73e202c092619e116e71efb476c00_amd64",
"product_identification_helper": {
"purl": "pkg:oci/clusterclaims-controller-rhel9@sha256%3Aa9871b54bfa689489d578155adb5a483cab73e202c092619e116e71efb476c00?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769806916"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:d0dbcb780c8782e3b1d6abda17255bc45ec4fb5d01e29e8cb3b91bfa0a46c55a_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:d0dbcb780c8782e3b1d6abda17255bc45ec4fb5d01e29e8cb3b91bfa0a46c55a_amd64",
"product_id": "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:d0dbcb780c8782e3b1d6abda17255bc45ec4fb5d01e29e8cb3b91bfa0a46c55a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/clusterlifecycle-state-metrics-rhel9@sha256%3Ad0dbcb780c8782e3b1d6abda17255bc45ec4fb5d01e29e8cb3b91bfa0a46c55a?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770680860"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:0a49a64e48aed198f1ead92cd6584bd8b62813dc2621489783b9a62469d7f9e6_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:0a49a64e48aed198f1ead92cd6584bd8b62813dc2621489783b9a62469d7f9e6_amd64",
"product_id": "registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:0a49a64e48aed198f1ead92cd6584bd8b62813dc2621489783b9a62469d7f9e6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/console-mce-rhel9@sha256%3A0a49a64e48aed198f1ead92cd6584bd8b62813dc2621489783b9a62469d7f9e6?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769990869"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:0f47ceec837a12497ee911279b0fba82481e72ee163670a8674630f948d39aba_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:0f47ceec837a12497ee911279b0fba82481e72ee163670a8674630f948d39aba_amd64",
"product_id": "registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:0f47ceec837a12497ee911279b0fba82481e72ee163670a8674630f948d39aba_amd64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-rhel9@sha256%3A0f47ceec837a12497ee911279b0fba82481e72ee163670a8674630f948d39aba?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770059015"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/hive-rhel9@sha256:b95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/hive-rhel9@sha256:b95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb_amd64",
"product_id": "registry.redhat.io/multicluster-engine/hive-rhel9@sha256:b95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hive-rhel9@sha256%3Ab95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770693331"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:ced6dbca20663462d35a97ca21836503e9987f29d37896ce8c5fb89650268762_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:ced6dbca20663462d35a97ca21836503e9987f29d37896ce8c5fb89650268762_amd64",
"product_id": "registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:ced6dbca20663462d35a97ca21836503e9987f29d37896ce8c5fb89650268762_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-addon-rhel9-operator@sha256%3Aced6dbca20663462d35a97ca21836503e9987f29d37896ce8c5fb89650268762?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770161940"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:371f8ec4475c9af90dbaf1a76a6b1217e195d3c371b0903137df92e8733371db_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:371f8ec4475c9af90dbaf1a76a6b1217e195d3c371b0903137df92e8733371db_amd64",
"product_id": "registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:371f8ec4475c9af90dbaf1a76a6b1217e195d3c371b0903137df92e8733371db_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-cli-rhel9@sha256%3A371f8ec4475c9af90dbaf1a76a6b1217e195d3c371b0903137df92e8733371db?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770161903"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:e6d522327993a91ed50b12745b26db70b5f7b374bb015ef7165ef7c3b59529b4_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:e6d522327993a91ed50b12745b26db70b5f7b374bb015ef7165ef7c3b59529b4_amd64",
"product_id": "registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:e6d522327993a91ed50b12745b26db70b5f7b374bb015ef7165ef7c3b59529b4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-rhel9-operator@sha256%3Ae6d522327993a91ed50b12745b26db70b5f7b374bb015ef7165ef7c3b59529b4?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770161899"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:b8e2d11f40a5a29f0a3fc870dafd8ce6c72e8983f44d5084814b0cc56d410fe7_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:b8e2d11f40a5a29f0a3fc870dafd8ce6c72e8983f44d5084814b0cc56d410fe7_amd64",
"product_id": "registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:b8e2d11f40a5a29f0a3fc870dafd8ce6c72e8983f44d5084814b0cc56d410fe7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/image-based-install-rhel9@sha256%3Ab8e2d11f40a5a29f0a3fc870dafd8ce6c72e8983f44d5084814b0cc56d410fe7?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770290544"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:a6dc13baffa1382bc1316588eba2e63cfc1630d059b3b9ab53dd53c98d135220_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:a6dc13baffa1382bc1316588eba2e63cfc1630d059b3b9ab53dd53c98d135220_amd64",
"product_id": "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:a6dc13baffa1382bc1316588eba2e63cfc1630d059b3b9ab53dd53c98d135220_amd64",
"product_identification_helper": {
"purl": "pkg:oci/kube-rbac-proxy-mce-rhel9@sha256%3Aa6dc13baffa1382bc1316588eba2e63cfc1630d059b3b9ab53dd53c98d135220?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770039904"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:572430d7b231e93613667d049f11ad8c0570f9cda09b1a0d9c9367a31ada8d86_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:572430d7b231e93613667d049f11ad8c0570f9cda09b1a0d9c9367a31ada8d86_amd64",
"product_id": "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:572430d7b231e93613667d049f11ad8c0570f9cda09b1a0d9c9367a31ada8d86_amd64",
"product_identification_helper": {
"purl": "pkg:oci/managed-serviceaccount-rhel9@sha256%3A572430d7b231e93613667d049f11ad8c0570f9cda09b1a0d9c9367a31ada8d86?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770680575"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:e448d52eede5096fdb44b6850905a71959e2f90db6fea1cdd17cca941959a9d8_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:e448d52eede5096fdb44b6850905a71959e2f90db6fea1cdd17cca941959a9d8_amd64",
"product_id": "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:e448d52eede5096fdb44b6850905a71959e2f90db6fea1cdd17cca941959a9d8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/managedcluster-import-controller-rhel9@sha256%3Ae448d52eede5096fdb44b6850905a71959e2f90db6fea1cdd17cca941959a9d8?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769844051"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:dc0ffee2f8c96c6ee22a2ddb06d14e08149561bab7b4195d08b59f628870af68_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:dc0ffee2f8c96c6ee22a2ddb06d14e08149561bab7b4195d08b59f628870af68_amd64",
"product_id": "registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:dc0ffee2f8c96c6ee22a2ddb06d14e08149561bab7b4195d08b59f628870af68_amd64",
"product_identification_helper": {
"purl": "pkg:oci/multicloud-manager-rhel9@sha256%3Adc0ffee2f8c96c6ee22a2ddb06d14e08149561bab7b4195d08b59f628870af68?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769744081"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/placement-rhel9@sha256:6f3a3fcf20935e6454baf90004604407c0e205b78d5accc10aefdb03fde0faf6_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/placement-rhel9@sha256:6f3a3fcf20935e6454baf90004604407c0e205b78d5accc10aefdb03fde0faf6_amd64",
"product_id": "registry.redhat.io/multicluster-engine/placement-rhel9@sha256:6f3a3fcf20935e6454baf90004604407c0e205b78d5accc10aefdb03fde0faf6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/placement-rhel9@sha256%3A6f3a3fcf20935e6454baf90004604407c0e205b78d5accc10aefdb03fde0faf6?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769693820"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:d23b6e3b510f387235b042dd3e658caab3a3af7386895a53f0967fd8bca77f80_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:d23b6e3b510f387235b042dd3e658caab3a3af7386895a53f0967fd8bca77f80_amd64",
"product_id": "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:d23b6e3b510f387235b042dd3e658caab3a3af7386895a53f0967fd8bca77f80_amd64",
"product_identification_helper": {
"purl": "pkg:oci/provider-credential-controller-rhel9@sha256%3Ad23b6e3b510f387235b042dd3e658caab3a3af7386895a53f0967fd8bca77f80?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770161905"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/registration-rhel9@sha256:05094b109396ae9f2a5f346602051a7310000d08890540d1fdef3712455f51c0_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/registration-rhel9@sha256:05094b109396ae9f2a5f346602051a7310000d08890540d1fdef3712455f51c0_amd64",
"product_id": "registry.redhat.io/multicluster-engine/registration-rhel9@sha256:05094b109396ae9f2a5f346602051a7310000d08890540d1fdef3712455f51c0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/registration-rhel9@sha256%3A05094b109396ae9f2a5f346602051a7310000d08890540d1fdef3712455f51c0?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769693823"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:8839a8851cea3d34dd15274678b6f00a80394308197a877be5505f4af39b62cc_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:8839a8851cea3d34dd15274678b6f00a80394308197a877be5505f4af39b62cc_amd64",
"product_id": "registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:8839a8851cea3d34dd15274678b6f00a80394308197a877be5505f4af39b62cc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/registration-operator-rhel9@sha256%3A8839a8851cea3d34dd15274678b6f00a80394308197a877be5505f4af39b62cc?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769693820"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/work-rhel9@sha256:f9c0e9e31a1aeddfefb4f24f7dd70971c1e32d6c4ac99745f81ea63afb526823_amd64",
"product": {
"name": "registry.redhat.io/multicluster-engine/work-rhel9@sha256:f9c0e9e31a1aeddfefb4f24f7dd70971c1e32d6c4ac99745f81ea63afb526823_amd64",
"product_id": "registry.redhat.io/multicluster-engine/work-rhel9@sha256:f9c0e9e31a1aeddfefb4f24f7dd70971c1e32d6c4ac99745f81ea63afb526823_amd64",
"product_identification_helper": {
"purl": "pkg:oci/work-rhel9@sha256%3Af9c0e9e31a1aeddfefb4f24f7dd70971c1e32d6c4ac99745f81ea63afb526823?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769693824"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:e4e7e0b3fc069d4746f6584047f8b40cd774b2556f11c2cabb57923a44ef389d_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:e4e7e0b3fc069d4746f6584047f8b40cd774b2556f11c2cabb57923a44ef389d_arm64",
"product_id": "registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:e4e7e0b3fc069d4746f6584047f8b40cd774b2556f11c2cabb57923a44ef389d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/addon-manager-rhel9@sha256%3Ae4e7e0b3fc069d4746f6584047f8b40cd774b2556f11c2cabb57923a44ef389d?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769693820"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4b6d6e9d9146d9834fb999ee2cbec8c56806d09bce1137bd3869fa125d064f10_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4b6d6e9d9146d9834fb999ee2cbec8c56806d09bce1137bd3869fa125d064f10_arm64",
"product_id": "registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4b6d6e9d9146d9834fb999ee2cbec8c56806d09bce1137bd3869fa125d064f10_arm64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel9@sha256%3A4b6d6e9d9146d9834fb999ee2cbec8c56806d09bce1137bd3869fa125d064f10?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770594104"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:10981e0c7a156dbfd3b8cec809c618773f3d7806a2a24c0fb1cda2e93ed6ae98_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:10981e0c7a156dbfd3b8cec809c618773f3d7806a2a24c0fb1cda2e93ed6ae98_arm64",
"product_id": "registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:10981e0c7a156dbfd3b8cec809c618773f3d7806a2a24c0fb1cda2e93ed6ae98_arm64",
"product_identification_helper": {
"purl": "pkg:oci/backplane-rhel9-operator@sha256%3A10981e0c7a156dbfd3b8cec809c618773f3d7806a2a24c0fb1cda2e93ed6ae98?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770302751"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:b2f27f77bcbb85c3a57d40c14928a3922877270f4748cb2d03abfc4300f1925c_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:b2f27f77bcbb85c3a57d40c14928a3922877270f4748cb2d03abfc4300f1925c_arm64",
"product_id": "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:b2f27f77bcbb85c3a57d40c14928a3922877270f4748cb2d03abfc4300f1925c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-agent-rhel9@sha256%3Ab2f27f77bcbb85c3a57d40c14928a3922877270f4748cb2d03abfc4300f1925c?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770104648"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:d9fecb5eebf1127819cf7a3f2c2b63e050cab8864c51d4dbcad4d95921a9b698_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:d9fecb5eebf1127819cf7a3f2c2b63e050cab8864c51d4dbcad4d95921a9b698_arm64",
"product_id": "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:d9fecb5eebf1127819cf7a3f2c2b63e050cab8864c51d4dbcad4d95921a9b698_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-kubevirt-rhel9@sha256%3Ad9fecb5eebf1127819cf7a3f2c2b63e050cab8864c51d4dbcad4d95921a9b698?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770190066"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:4ea287235d5dbf2385f4d217690b54cd5ce56820735ae96d66ea03d86d4426c3_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:4ea287235d5dbf2385f4d217690b54cd5ce56820735ae96d66ea03d86d4426c3_arm64",
"product_id": "registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:4ea287235d5dbf2385f4d217690b54cd5ce56820735ae96d66ea03d86d4426c3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/capoa-bootstrap-rhel9@sha256%3A4ea287235d5dbf2385f4d217690b54cd5ce56820735ae96d66ea03d86d4426c3?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770710226"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:c39a384c11e5242dc4b25fdd32813b4ff408b188af76df03e9757796fbc7a001_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:c39a384c11e5242dc4b25fdd32813b4ff408b188af76df03e9757796fbc7a001_arm64",
"product_id": "registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:c39a384c11e5242dc4b25fdd32813b4ff408b188af76df03e9757796fbc7a001_arm64",
"product_identification_helper": {
"purl": "pkg:oci/capoa-control-plane-rhel9@sha256%3Ac39a384c11e5242dc4b25fdd32813b4ff408b188af76df03e9757796fbc7a001?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770710226"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:cc46200f1bd3aa621f80fc5535c917318d50084eea265b22fe1b79871184d7bb_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:cc46200f1bd3aa621f80fc5535c917318d50084eea265b22fe1b79871184d7bb_arm64",
"product_id": "registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:cc46200f1bd3aa621f80fc5535c917318d50084eea265b22fe1b79871184d7bb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/mce-capi-webhook-config-rhel9@sha256%3Acc46200f1bd3aa621f80fc5535c917318d50084eea265b22fe1b79871184d7bb?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770667801"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:e7dc46d30ae833d7924260391781b20ffc25693073e1a4b60266caa6bd725f90_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:e7dc46d30ae833d7924260391781b20ffc25693073e1a4b60266caa6bd725f90_arm64",
"product_id": "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:e7dc46d30ae833d7924260391781b20ffc25693073e1a4b60266caa6bd725f90_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-curator-controller-rhel9@sha256%3Ae7dc46d30ae833d7924260391781b20ffc25693073e1a4b60266caa6bd725f90?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769895731"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:0712ee64942be9d307a5d89d5333a968092a685fa71c88c7eabe1498e2e3a915_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:0712ee64942be9d307a5d89d5333a968092a685fa71c88c7eabe1498e2e3a915_arm64",
"product_id": "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:0712ee64942be9d307a5d89d5333a968092a685fa71c88c7eabe1498e2e3a915_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-image-set-controller-rhel9@sha256%3A0712ee64942be9d307a5d89d5333a968092a685fa71c88c7eabe1498e2e3a915?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769721748"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:d0955c18fa4864e073bfb9a61b42261587fc2f5f1b2f29cd0b139be5373b578a_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:d0955c18fa4864e073bfb9a61b42261587fc2f5f1b2f29cd0b139be5373b578a_arm64",
"product_id": "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:d0955c18fa4864e073bfb9a61b42261587fc2f5f1b2f29cd0b139be5373b578a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-addon-rhel9@sha256%3Ad0955c18fa4864e073bfb9a61b42261587fc2f5f1b2f29cd0b139be5373b578a?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770364471"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:84d99fc9411e1a8d409d8c6bcd345cfdfee5c5986d6489a2633ffc7d4ad496b4_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:84d99fc9411e1a8d409d8c6bcd345cfdfee5c5986d6489a2633ffc7d4ad496b4_arm64",
"product_id": "registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:84d99fc9411e1a8d409d8c6bcd345cfdfee5c5986d6489a2633ffc7d4ad496b4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-rhel9@sha256%3A84d99fc9411e1a8d409d8c6bcd345cfdfee5c5986d6489a2633ffc7d4ad496b4?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769752462"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a53abad37395ec507071b894e51a0086b063a1d1d27e4d029b2d3cfb51bc0d14_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a53abad37395ec507071b894e51a0086b063a1d1d27e4d029b2d3cfb51bc0d14_arm64",
"product_id": "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a53abad37395ec507071b894e51a0086b063a1d1d27e4d029b2d3cfb51bc0d14_arm64",
"product_identification_helper": {
"purl": "pkg:oci/clusterclaims-controller-rhel9@sha256%3Aa53abad37395ec507071b894e51a0086b063a1d1d27e4d029b2d3cfb51bc0d14?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769806916"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:4955d00cb76f1360a80679973e9d53fcf38a57e0220bc8a29728cd0360327972_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:4955d00cb76f1360a80679973e9d53fcf38a57e0220bc8a29728cd0360327972_arm64",
"product_id": "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:4955d00cb76f1360a80679973e9d53fcf38a57e0220bc8a29728cd0360327972_arm64",
"product_identification_helper": {
"purl": "pkg:oci/clusterlifecycle-state-metrics-rhel9@sha256%3A4955d00cb76f1360a80679973e9d53fcf38a57e0220bc8a29728cd0360327972?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770680860"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:2c17ef74e6ec8ae3a02268e43d9018eefaafc4493f94de3a8ca6a6fc836be6a4_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:2c17ef74e6ec8ae3a02268e43d9018eefaafc4493f94de3a8ca6a6fc836be6a4_arm64",
"product_id": "registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:2c17ef74e6ec8ae3a02268e43d9018eefaafc4493f94de3a8ca6a6fc836be6a4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/console-mce-rhel9@sha256%3A2c17ef74e6ec8ae3a02268e43d9018eefaafc4493f94de3a8ca6a6fc836be6a4?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769990869"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:32166ec828cbc58224e236a86bd7439464379272f473bcdcd2ec765f7081a5b7_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:32166ec828cbc58224e236a86bd7439464379272f473bcdcd2ec765f7081a5b7_arm64",
"product_id": "registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:32166ec828cbc58224e236a86bd7439464379272f473bcdcd2ec765f7081a5b7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-rhel9@sha256%3A32166ec828cbc58224e236a86bd7439464379272f473bcdcd2ec765f7081a5b7?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770059015"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/hive-rhel9@sha256:44e5c0c8674682d03d564fef5e9f668d4ab71e6f27a64ee1bd7a2cf0c47d0db1_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/hive-rhel9@sha256:44e5c0c8674682d03d564fef5e9f668d4ab71e6f27a64ee1bd7a2cf0c47d0db1_arm64",
"product_id": "registry.redhat.io/multicluster-engine/hive-rhel9@sha256:44e5c0c8674682d03d564fef5e9f668d4ab71e6f27a64ee1bd7a2cf0c47d0db1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hive-rhel9@sha256%3A44e5c0c8674682d03d564fef5e9f668d4ab71e6f27a64ee1bd7a2cf0c47d0db1?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770693331"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:661171f5a869f110ada60973b2c8289d80df4e7e7373e13bdb68bd5f59be91ea_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:661171f5a869f110ada60973b2c8289d80df4e7e7373e13bdb68bd5f59be91ea_arm64",
"product_id": "registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:661171f5a869f110ada60973b2c8289d80df4e7e7373e13bdb68bd5f59be91ea_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-addon-rhel9-operator@sha256%3A661171f5a869f110ada60973b2c8289d80df4e7e7373e13bdb68bd5f59be91ea?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770161940"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:e20f2aa3083e6d4100b4a38df9b416ac8b0f6a475fffff9754437fe4697dbd94_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:e20f2aa3083e6d4100b4a38df9b416ac8b0f6a475fffff9754437fe4697dbd94_arm64",
"product_id": "registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:e20f2aa3083e6d4100b4a38df9b416ac8b0f6a475fffff9754437fe4697dbd94_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-cli-rhel9@sha256%3Ae20f2aa3083e6d4100b4a38df9b416ac8b0f6a475fffff9754437fe4697dbd94?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770161903"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:7d16492d3d30bb614c6155b2a3de1a3cfcd55100c06078c96557831f9c19221c_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:7d16492d3d30bb614c6155b2a3de1a3cfcd55100c06078c96557831f9c19221c_arm64",
"product_id": "registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:7d16492d3d30bb614c6155b2a3de1a3cfcd55100c06078c96557831f9c19221c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-rhel9-operator@sha256%3A7d16492d3d30bb614c6155b2a3de1a3cfcd55100c06078c96557831f9c19221c?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770161899"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:1052d9b0befb2fd315b445ed4ccca0490075fa82d2752f1507f3daba6476d87a_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:1052d9b0befb2fd315b445ed4ccca0490075fa82d2752f1507f3daba6476d87a_arm64",
"product_id": "registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:1052d9b0befb2fd315b445ed4ccca0490075fa82d2752f1507f3daba6476d87a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/image-based-install-rhel9@sha256%3A1052d9b0befb2fd315b445ed4ccca0490075fa82d2752f1507f3daba6476d87a?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770290544"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:47265159cef044b5a4086af6506b3ad570d0966d80a5dd0c69d391ced37e2572_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:47265159cef044b5a4086af6506b3ad570d0966d80a5dd0c69d391ced37e2572_arm64",
"product_id": "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:47265159cef044b5a4086af6506b3ad570d0966d80a5dd0c69d391ced37e2572_arm64",
"product_identification_helper": {
"purl": "pkg:oci/kube-rbac-proxy-mce-rhel9@sha256%3A47265159cef044b5a4086af6506b3ad570d0966d80a5dd0c69d391ced37e2572?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770039904"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:9c3a0cae8f0998134af791cf690fe6a42783f6caed795c62d67c57ebd849d983_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:9c3a0cae8f0998134af791cf690fe6a42783f6caed795c62d67c57ebd849d983_arm64",
"product_id": "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:9c3a0cae8f0998134af791cf690fe6a42783f6caed795c62d67c57ebd849d983_arm64",
"product_identification_helper": {
"purl": "pkg:oci/managed-serviceaccount-rhel9@sha256%3A9c3a0cae8f0998134af791cf690fe6a42783f6caed795c62d67c57ebd849d983?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770680575"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:ba5349debff221eb5e47fac02f60c5d664a32b5cf53a654e3e983ef036acb263_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:ba5349debff221eb5e47fac02f60c5d664a32b5cf53a654e3e983ef036acb263_arm64",
"product_id": "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:ba5349debff221eb5e47fac02f60c5d664a32b5cf53a654e3e983ef036acb263_arm64",
"product_identification_helper": {
"purl": "pkg:oci/managedcluster-import-controller-rhel9@sha256%3Aba5349debff221eb5e47fac02f60c5d664a32b5cf53a654e3e983ef036acb263?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769844051"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:5d1e7ef39de25f974949e49cbe325783e78071678e30bc3d2311710875dba2bb_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:5d1e7ef39de25f974949e49cbe325783e78071678e30bc3d2311710875dba2bb_arm64",
"product_id": "registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:5d1e7ef39de25f974949e49cbe325783e78071678e30bc3d2311710875dba2bb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/multicloud-manager-rhel9@sha256%3A5d1e7ef39de25f974949e49cbe325783e78071678e30bc3d2311710875dba2bb?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769744081"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4cafcf98bfde7d9700ea55ef88c183fbf172da5d1bbc57c315df4f0d00591547_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4cafcf98bfde7d9700ea55ef88c183fbf172da5d1bbc57c315df4f0d00591547_arm64",
"product_id": "registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4cafcf98bfde7d9700ea55ef88c183fbf172da5d1bbc57c315df4f0d00591547_arm64",
"product_identification_helper": {
"purl": "pkg:oci/placement-rhel9@sha256%3A4cafcf98bfde7d9700ea55ef88c183fbf172da5d1bbc57c315df4f0d00591547?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769693820"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:62fb9dd8ffc2b61de085d39ba2fb0a8192c3634a79b6cf4d9821fdc95efc1fe4_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:62fb9dd8ffc2b61de085d39ba2fb0a8192c3634a79b6cf4d9821fdc95efc1fe4_arm64",
"product_id": "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:62fb9dd8ffc2b61de085d39ba2fb0a8192c3634a79b6cf4d9821fdc95efc1fe4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/provider-credential-controller-rhel9@sha256%3A62fb9dd8ffc2b61de085d39ba2fb0a8192c3634a79b6cf4d9821fdc95efc1fe4?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770161905"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b222fa278dcff0824bc0340e27b6182ffc04506e54d99048f5c01c6bc604ad7_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b222fa278dcff0824bc0340e27b6182ffc04506e54d99048f5c01c6bc604ad7_arm64",
"product_id": "registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b222fa278dcff0824bc0340e27b6182ffc04506e54d99048f5c01c6bc604ad7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/registration-rhel9@sha256%3A1b222fa278dcff0824bc0340e27b6182ffc04506e54d99048f5c01c6bc604ad7?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769693823"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:9133c95a0fefcec77396b1ec04b33024a0e1a3716658de9debeb92a5ffc47f31_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:9133c95a0fefcec77396b1ec04b33024a0e1a3716658de9debeb92a5ffc47f31_arm64",
"product_id": "registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:9133c95a0fefcec77396b1ec04b33024a0e1a3716658de9debeb92a5ffc47f31_arm64",
"product_identification_helper": {
"purl": "pkg:oci/registration-operator-rhel9@sha256%3A9133c95a0fefcec77396b1ec04b33024a0e1a3716658de9debeb92a5ffc47f31?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769693820"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/work-rhel9@sha256:244bd3fa3c960a9eee6d978fe9291d7b112daf2f5516840292fd0298acee5ac1_arm64",
"product": {
"name": "registry.redhat.io/multicluster-engine/work-rhel9@sha256:244bd3fa3c960a9eee6d978fe9291d7b112daf2f5516840292fd0298acee5ac1_arm64",
"product_id": "registry.redhat.io/multicluster-engine/work-rhel9@sha256:244bd3fa3c960a9eee6d978fe9291d7b112daf2f5516840292fd0298acee5ac1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/work-rhel9@sha256%3A244bd3fa3c960a9eee6d978fe9291d7b112daf2f5516840292fd0298acee5ac1?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769693824"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:bcf5e63aba5e78b6a41dadcf73b70dc9940380c232cc2931b5da3ddfe2ecf8fc_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:bcf5e63aba5e78b6a41dadcf73b70dc9940380c232cc2931b5da3ddfe2ecf8fc_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:bcf5e63aba5e78b6a41dadcf73b70dc9940380c232cc2931b5da3ddfe2ecf8fc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/addon-manager-rhel9@sha256%3Abcf5e63aba5e78b6a41dadcf73b70dc9940380c232cc2931b5da3ddfe2ecf8fc?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769693820"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:93147af5126f419ac3fe2a0c95715b76299f27ff642483b2d14b89301367d056_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:93147af5126f419ac3fe2a0c95715b76299f27ff642483b2d14b89301367d056_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:93147af5126f419ac3fe2a0c95715b76299f27ff642483b2d14b89301367d056_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel9@sha256%3A93147af5126f419ac3fe2a0c95715b76299f27ff642483b2d14b89301367d056?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770594104"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:fd7b341a1e55aec25f6e3221f03d140561be81a230590907dd74fe1a021df006_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:fd7b341a1e55aec25f6e3221f03d140561be81a230590907dd74fe1a021df006_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:fd7b341a1e55aec25f6e3221f03d140561be81a230590907dd74fe1a021df006_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/backplane-rhel9-operator@sha256%3Afd7b341a1e55aec25f6e3221f03d140561be81a230590907dd74fe1a021df006?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770302751"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:01a0a5b524624b960339e6d40bc92eaf666532b7905b8b79a31a0ad512336f20_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:01a0a5b524624b960339e6d40bc92eaf666532b7905b8b79a31a0ad512336f20_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:01a0a5b524624b960339e6d40bc92eaf666532b7905b8b79a31a0ad512336f20_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-agent-rhel9@sha256%3A01a0a5b524624b960339e6d40bc92eaf666532b7905b8b79a31a0ad512336f20?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770104648"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9e4527837150c9054e9f5eb594d557fb4642b86f1dfd109897ea63b5ff5984dd_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9e4527837150c9054e9f5eb594d557fb4642b86f1dfd109897ea63b5ff5984dd_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9e4527837150c9054e9f5eb594d557fb4642b86f1dfd109897ea63b5ff5984dd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-kubevirt-rhel9@sha256%3A9e4527837150c9054e9f5eb594d557fb4642b86f1dfd109897ea63b5ff5984dd?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770190066"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:0180391fe4bca530eb5678bf95922d10365b286279b966136b67bf8d83a9a18c_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:0180391fe4bca530eb5678bf95922d10365b286279b966136b67bf8d83a9a18c_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:0180391fe4bca530eb5678bf95922d10365b286279b966136b67bf8d83a9a18c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/capoa-bootstrap-rhel9@sha256%3A0180391fe4bca530eb5678bf95922d10365b286279b966136b67bf8d83a9a18c?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770710226"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:8d86d2d4ac2459d61a1e493603c9eb7a3f0d584ad53aca2af884bf8bb8b30e71_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:8d86d2d4ac2459d61a1e493603c9eb7a3f0d584ad53aca2af884bf8bb8b30e71_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:8d86d2d4ac2459d61a1e493603c9eb7a3f0d584ad53aca2af884bf8bb8b30e71_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/capoa-control-plane-rhel9@sha256%3A8d86d2d4ac2459d61a1e493603c9eb7a3f0d584ad53aca2af884bf8bb8b30e71?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770710226"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:1136c984617f2a3c71a5b451c5de88f06245a9a9c83783c16a6938b6f7272f80_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:1136c984617f2a3c71a5b451c5de88f06245a9a9c83783c16a6938b6f7272f80_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:1136c984617f2a3c71a5b451c5de88f06245a9a9c83783c16a6938b6f7272f80_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mce-capi-webhook-config-rhel9@sha256%3A1136c984617f2a3c71a5b451c5de88f06245a9a9c83783c16a6938b6f7272f80?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770667801"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:437680b6193c0cf77c28cb2124e01a33b7dd51063366c5781aeaf339a840b056_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:437680b6193c0cf77c28cb2124e01a33b7dd51063366c5781aeaf339a840b056_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:437680b6193c0cf77c28cb2124e01a33b7dd51063366c5781aeaf339a840b056_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-curator-controller-rhel9@sha256%3A437680b6193c0cf77c28cb2124e01a33b7dd51063366c5781aeaf339a840b056?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769895731"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:58d58f838d9fc2ed84635083a00725a47334ee03b8a4282000b69dedddd7a9bd_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:58d58f838d9fc2ed84635083a00725a47334ee03b8a4282000b69dedddd7a9bd_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:58d58f838d9fc2ed84635083a00725a47334ee03b8a4282000b69dedddd7a9bd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-image-set-controller-rhel9@sha256%3A58d58f838d9fc2ed84635083a00725a47334ee03b8a4282000b69dedddd7a9bd?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769721748"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:a86aa371b54e25d0b38ae06aea67577142b227bea31597493639ec0018391a4b_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:a86aa371b54e25d0b38ae06aea67577142b227bea31597493639ec0018391a4b_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:a86aa371b54e25d0b38ae06aea67577142b227bea31597493639ec0018391a4b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-addon-rhel9@sha256%3Aa86aa371b54e25d0b38ae06aea67577142b227bea31597493639ec0018391a4b?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770364471"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:5e2316240808f561c9ec5b04a57e41776b7efc9a26afa9ae10f7bf7693b30d97_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:5e2316240808f561c9ec5b04a57e41776b7efc9a26afa9ae10f7bf7693b30d97_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:5e2316240808f561c9ec5b04a57e41776b7efc9a26afa9ae10f7bf7693b30d97_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-rhel9@sha256%3A5e2316240808f561c9ec5b04a57e41776b7efc9a26afa9ae10f7bf7693b30d97?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769752462"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:2acf15b73b6db09469d53c6317088fc5f633f684f8421cc4a09f52d1056a2bb6_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:2acf15b73b6db09469d53c6317088fc5f633f684f8421cc4a09f52d1056a2bb6_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:2acf15b73b6db09469d53c6317088fc5f633f684f8421cc4a09f52d1056a2bb6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/clusterclaims-controller-rhel9@sha256%3A2acf15b73b6db09469d53c6317088fc5f633f684f8421cc4a09f52d1056a2bb6?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769806916"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:684094906425b67784bb7f10a152cd15e354bd84a2a2d68178000122bd43794d_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:684094906425b67784bb7f10a152cd15e354bd84a2a2d68178000122bd43794d_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:684094906425b67784bb7f10a152cd15e354bd84a2a2d68178000122bd43794d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/clusterlifecycle-state-metrics-rhel9@sha256%3A684094906425b67784bb7f10a152cd15e354bd84a2a2d68178000122bd43794d?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770680860"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:eafd28f0dd525e4c11b90d01e686ada9bb6ef9e9097e81608df8c04ed15d513b_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:eafd28f0dd525e4c11b90d01e686ada9bb6ef9e9097e81608df8c04ed15d513b_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:eafd28f0dd525e4c11b90d01e686ada9bb6ef9e9097e81608df8c04ed15d513b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/console-mce-rhel9@sha256%3Aeafd28f0dd525e4c11b90d01e686ada9bb6ef9e9097e81608df8c04ed15d513b?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769990869"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:65c8b3770f82794d55d269a004948a8e2c54cbd99b09552b4cdb91475baee5a2_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:65c8b3770f82794d55d269a004948a8e2c54cbd99b09552b4cdb91475baee5a2_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:65c8b3770f82794d55d269a004948a8e2c54cbd99b09552b4cdb91475baee5a2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/discovery-rhel9@sha256%3A65c8b3770f82794d55d269a004948a8e2c54cbd99b09552b4cdb91475baee5a2?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770059015"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/hive-rhel9@sha256:8422d2c6e47dbb14bc80b03734fd702c57724bf384557e9b9e1a67b85e6b8185_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/hive-rhel9@sha256:8422d2c6e47dbb14bc80b03734fd702c57724bf384557e9b9e1a67b85e6b8185_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/hive-rhel9@sha256:8422d2c6e47dbb14bc80b03734fd702c57724bf384557e9b9e1a67b85e6b8185_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/hive-rhel9@sha256%3A8422d2c6e47dbb14bc80b03734fd702c57724bf384557e9b9e1a67b85e6b8185?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770693331"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:e374c0aad61fb4a2af3dd0e8310286e45e283dac47c8e766f34cabf1d8cc2563_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:e374c0aad61fb4a2af3dd0e8310286e45e283dac47c8e766f34cabf1d8cc2563_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:e374c0aad61fb4a2af3dd0e8310286e45e283dac47c8e766f34cabf1d8cc2563_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-addon-rhel9-operator@sha256%3Ae374c0aad61fb4a2af3dd0e8310286e45e283dac47c8e766f34cabf1d8cc2563?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770161940"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:27f2b11d9017cad3af4f872ce382b54492bae329c499f4423c6ef7342522f844_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:27f2b11d9017cad3af4f872ce382b54492bae329c499f4423c6ef7342522f844_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:27f2b11d9017cad3af4f872ce382b54492bae329c499f4423c6ef7342522f844_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-cli-rhel9@sha256%3A27f2b11d9017cad3af4f872ce382b54492bae329c499f4423c6ef7342522f844?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770161903"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:85f7963a86254181a79cd48a98130c4b0cd50abe6d704940dac5958ab9d11863_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:85f7963a86254181a79cd48a98130c4b0cd50abe6d704940dac5958ab9d11863_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:85f7963a86254181a79cd48a98130c4b0cd50abe6d704940dac5958ab9d11863_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-rhel9-operator@sha256%3A85f7963a86254181a79cd48a98130c4b0cd50abe6d704940dac5958ab9d11863?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770161899"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:5511144641603a3fc4c93ae9d7253ba2fccc55f8806913a4e08ec9f3b919d5c8_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:5511144641603a3fc4c93ae9d7253ba2fccc55f8806913a4e08ec9f3b919d5c8_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:5511144641603a3fc4c93ae9d7253ba2fccc55f8806913a4e08ec9f3b919d5c8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/image-based-install-rhel9@sha256%3A5511144641603a3fc4c93ae9d7253ba2fccc55f8806913a4e08ec9f3b919d5c8?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770290544"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:e04fa41cee83d89a88fc68bc38aadaa69f9c9f30e9a95f19eba299647e5f99bc_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:e04fa41cee83d89a88fc68bc38aadaa69f9c9f30e9a95f19eba299647e5f99bc_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:e04fa41cee83d89a88fc68bc38aadaa69f9c9f30e9a95f19eba299647e5f99bc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/kube-rbac-proxy-mce-rhel9@sha256%3Ae04fa41cee83d89a88fc68bc38aadaa69f9c9f30e9a95f19eba299647e5f99bc?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770039904"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:1e8efca30bc8130a20834ee0dfeff80a62c4b129c2f849492a62f761a684d105_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:1e8efca30bc8130a20834ee0dfeff80a62c4b129c2f849492a62f761a684d105_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:1e8efca30bc8130a20834ee0dfeff80a62c4b129c2f849492a62f761a684d105_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/managed-serviceaccount-rhel9@sha256%3A1e8efca30bc8130a20834ee0dfeff80a62c4b129c2f849492a62f761a684d105?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770680575"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:2ad0563c640566cc6e55ae741b09cd353cdd8a343931596ed1ce93d49e076667_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:2ad0563c640566cc6e55ae741b09cd353cdd8a343931596ed1ce93d49e076667_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:2ad0563c640566cc6e55ae741b09cd353cdd8a343931596ed1ce93d49e076667_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/managedcluster-import-controller-rhel9@sha256%3A2ad0563c640566cc6e55ae741b09cd353cdd8a343931596ed1ce93d49e076667?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769844051"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:8b7aa7f81955082085fbf1317ad5d747f4e19ce35c13f17c8f57eb810a1adbf7_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:8b7aa7f81955082085fbf1317ad5d747f4e19ce35c13f17c8f57eb810a1adbf7_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:8b7aa7f81955082085fbf1317ad5d747f4e19ce35c13f17c8f57eb810a1adbf7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/multicloud-manager-rhel9@sha256%3A8b7aa7f81955082085fbf1317ad5d747f4e19ce35c13f17c8f57eb810a1adbf7?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769744081"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4974b49892263b43d379077d1d44ebf579e4da3700043a9c370e52359d852e7b_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4974b49892263b43d379077d1d44ebf579e4da3700043a9c370e52359d852e7b_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4974b49892263b43d379077d1d44ebf579e4da3700043a9c370e52359d852e7b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/placement-rhel9@sha256%3A4974b49892263b43d379077d1d44ebf579e4da3700043a9c370e52359d852e7b?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769693820"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:cfb71cbaeaa7cfa8280e19f89132a8ba8fc2ea84dfb6654975c1176ee1cfac4c_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:cfb71cbaeaa7cfa8280e19f89132a8ba8fc2ea84dfb6654975c1176ee1cfac4c_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:cfb71cbaeaa7cfa8280e19f89132a8ba8fc2ea84dfb6654975c1176ee1cfac4c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/provider-credential-controller-rhel9@sha256%3Acfb71cbaeaa7cfa8280e19f89132a8ba8fc2ea84dfb6654975c1176ee1cfac4c?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770161905"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/registration-rhel9@sha256:cc032f7a173f50c51872ddbf9a9c17fa51b7fd91cb3e7b8aeba378c2725043de_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/registration-rhel9@sha256:cc032f7a173f50c51872ddbf9a9c17fa51b7fd91cb3e7b8aeba378c2725043de_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/registration-rhel9@sha256:cc032f7a173f50c51872ddbf9a9c17fa51b7fd91cb3e7b8aeba378c2725043de_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/registration-rhel9@sha256%3Acc032f7a173f50c51872ddbf9a9c17fa51b7fd91cb3e7b8aeba378c2725043de?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769693823"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:2d2159059467f0f9f4eb6550d6fe1739193101d784a3098fce4f25b37f3753a7_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:2d2159059467f0f9f4eb6550d6fe1739193101d784a3098fce4f25b37f3753a7_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:2d2159059467f0f9f4eb6550d6fe1739193101d784a3098fce4f25b37f3753a7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/registration-operator-rhel9@sha256%3A2d2159059467f0f9f4eb6550d6fe1739193101d784a3098fce4f25b37f3753a7?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769693820"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/work-rhel9@sha256:aba46c2c0e3ab613120a479c75f9dde8c772e7ec24034886371665c5c6b2fa8d_ppc64le",
"product": {
"name": "registry.redhat.io/multicluster-engine/work-rhel9@sha256:aba46c2c0e3ab613120a479c75f9dde8c772e7ec24034886371665c5c6b2fa8d_ppc64le",
"product_id": "registry.redhat.io/multicluster-engine/work-rhel9@sha256:aba46c2c0e3ab613120a479c75f9dde8c772e7ec24034886371665c5c6b2fa8d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/work-rhel9@sha256%3Aaba46c2c0e3ab613120a479c75f9dde8c772e7ec24034886371665c5c6b2fa8d?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769693824"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:de69593578d899842a0e98781f9c3d58338ee0925fa0b6243aedbb569a64cd96_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:de69593578d899842a0e98781f9c3d58338ee0925fa0b6243aedbb569a64cd96_s390x",
"product_id": "registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:de69593578d899842a0e98781f9c3d58338ee0925fa0b6243aedbb569a64cd96_s390x",
"product_identification_helper": {
"purl": "pkg:oci/addon-manager-rhel9@sha256%3Ade69593578d899842a0e98781f9c3d58338ee0925fa0b6243aedbb569a64cd96?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769693820"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4489ffd456a5d5704dccafc45b523f572f90307e57b8b353f8d8ce4c42706d4f_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4489ffd456a5d5704dccafc45b523f572f90307e57b8b353f8d8ce4c42706d4f_s390x",
"product_id": "registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4489ffd456a5d5704dccafc45b523f572f90307e57b8b353f8d8ce4c42706d4f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel9@sha256%3A4489ffd456a5d5704dccafc45b523f572f90307e57b8b353f8d8ce4c42706d4f?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770594104"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:31f187246ac7da245c160b3afc5f1187d82cd2c039f85111a338165407d7d49d_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:31f187246ac7da245c160b3afc5f1187d82cd2c039f85111a338165407d7d49d_s390x",
"product_id": "registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:31f187246ac7da245c160b3afc5f1187d82cd2c039f85111a338165407d7d49d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/backplane-rhel9-operator@sha256%3A31f187246ac7da245c160b3afc5f1187d82cd2c039f85111a338165407d7d49d?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770302751"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:e5ca54ae610b6fdd062b22d68e04e8c9638a4afe9df3dee7316a09a4a50f929d_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:e5ca54ae610b6fdd062b22d68e04e8c9638a4afe9df3dee7316a09a4a50f929d_s390x",
"product_id": "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:e5ca54ae610b6fdd062b22d68e04e8c9638a4afe9df3dee7316a09a4a50f929d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-agent-rhel9@sha256%3Ae5ca54ae610b6fdd062b22d68e04e8c9638a4afe9df3dee7316a09a4a50f929d?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770104648"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:8f10940b7e9f69bb5f5bb40fb4575f24fc8a2f20916615d6af4eff36b0dc24b2_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:8f10940b7e9f69bb5f5bb40fb4575f24fc8a2f20916615d6af4eff36b0dc24b2_s390x",
"product_id": "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:8f10940b7e9f69bb5f5bb40fb4575f24fc8a2f20916615d6af4eff36b0dc24b2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-api-provider-kubevirt-rhel9@sha256%3A8f10940b7e9f69bb5f5bb40fb4575f24fc8a2f20916615d6af4eff36b0dc24b2?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770190066"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:e9d1e97601e8eaea73943489e782482703310d2e8f22a9fa234b640fcacbe64b_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:e9d1e97601e8eaea73943489e782482703310d2e8f22a9fa234b640fcacbe64b_s390x",
"product_id": "registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:e9d1e97601e8eaea73943489e782482703310d2e8f22a9fa234b640fcacbe64b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/capoa-bootstrap-rhel9@sha256%3Ae9d1e97601e8eaea73943489e782482703310d2e8f22a9fa234b640fcacbe64b?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770710226"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:e0137ca5fd87bc47473fc0fc4c619ea794fac6156d84f7f4fbc689fe3328640e_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:e0137ca5fd87bc47473fc0fc4c619ea794fac6156d84f7f4fbc689fe3328640e_s390x",
"product_id": "registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:e0137ca5fd87bc47473fc0fc4c619ea794fac6156d84f7f4fbc689fe3328640e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/capoa-control-plane-rhel9@sha256%3Ae0137ca5fd87bc47473fc0fc4c619ea794fac6156d84f7f4fbc689fe3328640e?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770710226"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:bdf691c5300034b0331daea8d92f942c3db66aa11fd726d977ae36fec1791695_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:bdf691c5300034b0331daea8d92f942c3db66aa11fd726d977ae36fec1791695_s390x",
"product_id": "registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:bdf691c5300034b0331daea8d92f942c3db66aa11fd726d977ae36fec1791695_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mce-capi-webhook-config-rhel9@sha256%3Abdf691c5300034b0331daea8d92f942c3db66aa11fd726d977ae36fec1791695?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770667801"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:0bf1c2e7d2204076757c8bbb922e11feacedcefff491bfabf481d4c27f310448_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:0bf1c2e7d2204076757c8bbb922e11feacedcefff491bfabf481d4c27f310448_s390x",
"product_id": "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:0bf1c2e7d2204076757c8bbb922e11feacedcefff491bfabf481d4c27f310448_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-curator-controller-rhel9@sha256%3A0bf1c2e7d2204076757c8bbb922e11feacedcefff491bfabf481d4c27f310448?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769895731"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2358f82cbcf6406c86a1ec0f9ccf649dfea143797cd7d112be21c6adfdbf87_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2358f82cbcf6406c86a1ec0f9ccf649dfea143797cd7d112be21c6adfdbf87_s390x",
"product_id": "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2358f82cbcf6406c86a1ec0f9ccf649dfea143797cd7d112be21c6adfdbf87_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-image-set-controller-rhel9@sha256%3A3b2358f82cbcf6406c86a1ec0f9ccf649dfea143797cd7d112be21c6adfdbf87?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769721748"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:2fdf436e71fee6739ae6fcd450007d76fc3fa43ba203a809f3337f22d9229bd5_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:2fdf436e71fee6739ae6fcd450007d76fc3fa43ba203a809f3337f22d9229bd5_s390x",
"product_id": "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:2fdf436e71fee6739ae6fcd450007d76fc3fa43ba203a809f3337f22d9229bd5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-addon-rhel9@sha256%3A2fdf436e71fee6739ae6fcd450007d76fc3fa43ba203a809f3337f22d9229bd5?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770364471"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:63be8363c2915b782cd9fc6007b761bc6d3ac9f77bfc35fae1c55c00974058f7_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:63be8363c2915b782cd9fc6007b761bc6d3ac9f77bfc35fae1c55c00974058f7_s390x",
"product_id": "registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:63be8363c2915b782cd9fc6007b761bc6d3ac9f77bfc35fae1c55c00974058f7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-proxy-rhel9@sha256%3A63be8363c2915b782cd9fc6007b761bc6d3ac9f77bfc35fae1c55c00974058f7?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769752462"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:bf6e25c9b7d66fb0c45c0ebdbbd0ee34b7a9e1cff1ac70128ee7e475812bfa7c_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:bf6e25c9b7d66fb0c45c0ebdbbd0ee34b7a9e1cff1ac70128ee7e475812bfa7c_s390x",
"product_id": "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:bf6e25c9b7d66fb0c45c0ebdbbd0ee34b7a9e1cff1ac70128ee7e475812bfa7c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/clusterclaims-controller-rhel9@sha256%3Abf6e25c9b7d66fb0c45c0ebdbbd0ee34b7a9e1cff1ac70128ee7e475812bfa7c?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769806916"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:8794c45c047ad41c71fbd788d35d493a9e4f78c947106391b0f67d3d572b2d06_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:8794c45c047ad41c71fbd788d35d493a9e4f78c947106391b0f67d3d572b2d06_s390x",
"product_id": "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:8794c45c047ad41c71fbd788d35d493a9e4f78c947106391b0f67d3d572b2d06_s390x",
"product_identification_helper": {
"purl": "pkg:oci/clusterlifecycle-state-metrics-rhel9@sha256%3A8794c45c047ad41c71fbd788d35d493a9e4f78c947106391b0f67d3d572b2d06?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770680860"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:40a5278bcc8e647aaf16ccca432c4d9bec67ec074569f192420bca529fdaf113_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:40a5278bcc8e647aaf16ccca432c4d9bec67ec074569f192420bca529fdaf113_s390x",
"product_id": "registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:40a5278bcc8e647aaf16ccca432c4d9bec67ec074569f192420bca529fdaf113_s390x",
"product_identification_helper": {
"purl": "pkg:oci/console-mce-rhel9@sha256%3A40a5278bcc8e647aaf16ccca432c4d9bec67ec074569f192420bca529fdaf113?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769990869"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:a3c91540f20f094fee24224bce21018aa671849e7f75aece1bddfb6c945289d2_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:a3c91540f20f094fee24224bce21018aa671849e7f75aece1bddfb6c945289d2_s390x",
"product_id": "registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:a3c91540f20f094fee24224bce21018aa671849e7f75aece1bddfb6c945289d2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/discovery-rhel9@sha256%3Aa3c91540f20f094fee24224bce21018aa671849e7f75aece1bddfb6c945289d2?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770059015"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/hive-rhel9@sha256:0b03429102eea10cc0733872bbc946bbfa378966b5d62e32762bd7a59c23e9de_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/hive-rhel9@sha256:0b03429102eea10cc0733872bbc946bbfa378966b5d62e32762bd7a59c23e9de_s390x",
"product_id": "registry.redhat.io/multicluster-engine/hive-rhel9@sha256:0b03429102eea10cc0733872bbc946bbfa378966b5d62e32762bd7a59c23e9de_s390x",
"product_identification_helper": {
"purl": "pkg:oci/hive-rhel9@sha256%3A0b03429102eea10cc0733872bbc946bbfa378966b5d62e32762bd7a59c23e9de?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770693331"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:9c1f70be52ba4c49de28376802bf2d73fe0a3bc44282ace7606cfb123233da4c_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:9c1f70be52ba4c49de28376802bf2d73fe0a3bc44282ace7606cfb123233da4c_s390x",
"product_id": "registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:9c1f70be52ba4c49de28376802bf2d73fe0a3bc44282ace7606cfb123233da4c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-addon-rhel9-operator@sha256%3A9c1f70be52ba4c49de28376802bf2d73fe0a3bc44282ace7606cfb123233da4c?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770161940"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:568aee9b50f1b79b0d3edea5e5a4f877ad8fcfe6f3e81e6f3cf049774dfe4bc9_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:568aee9b50f1b79b0d3edea5e5a4f877ad8fcfe6f3e81e6f3cf049774dfe4bc9_s390x",
"product_id": "registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:568aee9b50f1b79b0d3edea5e5a4f877ad8fcfe6f3e81e6f3cf049774dfe4bc9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-cli-rhel9@sha256%3A568aee9b50f1b79b0d3edea5e5a4f877ad8fcfe6f3e81e6f3cf049774dfe4bc9?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770161903"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:89a50676a19cc0187665f7c06ddd717a37df80c4b0eccb96447380b7ba2db663_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:89a50676a19cc0187665f7c06ddd717a37df80c4b0eccb96447380b7ba2db663_s390x",
"product_id": "registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:89a50676a19cc0187665f7c06ddd717a37df80c4b0eccb96447380b7ba2db663_s390x",
"product_identification_helper": {
"purl": "pkg:oci/hypershift-rhel9-operator@sha256%3A89a50676a19cc0187665f7c06ddd717a37df80c4b0eccb96447380b7ba2db663?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770161899"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:fd3eb25ba4e8baaf13bdebf9a5c70d20d79a642bccd808c8dfbec52b403a2608_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:fd3eb25ba4e8baaf13bdebf9a5c70d20d79a642bccd808c8dfbec52b403a2608_s390x",
"product_id": "registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:fd3eb25ba4e8baaf13bdebf9a5c70d20d79a642bccd808c8dfbec52b403a2608_s390x",
"product_identification_helper": {
"purl": "pkg:oci/image-based-install-rhel9@sha256%3Afd3eb25ba4e8baaf13bdebf9a5c70d20d79a642bccd808c8dfbec52b403a2608?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770290544"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d69051165ba4538e28097a2caa510ae3bab59223e473eb9286763a0c8e2137d2_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d69051165ba4538e28097a2caa510ae3bab59223e473eb9286763a0c8e2137d2_s390x",
"product_id": "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d69051165ba4538e28097a2caa510ae3bab59223e473eb9286763a0c8e2137d2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/kube-rbac-proxy-mce-rhel9@sha256%3Ad69051165ba4538e28097a2caa510ae3bab59223e473eb9286763a0c8e2137d2?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770039904"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:736ac64d54c2a12dc2234272862e5a52c283dca3273ed2c95cb73167bdc177fa_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:736ac64d54c2a12dc2234272862e5a52c283dca3273ed2c95cb73167bdc177fa_s390x",
"product_id": "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:736ac64d54c2a12dc2234272862e5a52c283dca3273ed2c95cb73167bdc177fa_s390x",
"product_identification_helper": {
"purl": "pkg:oci/managed-serviceaccount-rhel9@sha256%3A736ac64d54c2a12dc2234272862e5a52c283dca3273ed2c95cb73167bdc177fa?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770680575"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:cd373cc3574546fc2e48a58a3a7e90620494ccb24507337ef1d9a90aaf88d02d_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:cd373cc3574546fc2e48a58a3a7e90620494ccb24507337ef1d9a90aaf88d02d_s390x",
"product_id": "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:cd373cc3574546fc2e48a58a3a7e90620494ccb24507337ef1d9a90aaf88d02d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/managedcluster-import-controller-rhel9@sha256%3Acd373cc3574546fc2e48a58a3a7e90620494ccb24507337ef1d9a90aaf88d02d?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769844051"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:2d1bb2935a4c90bf9ca6b22a11a07fcaba002f2020d0ea15b82a7cf4df66713c_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:2d1bb2935a4c90bf9ca6b22a11a07fcaba002f2020d0ea15b82a7cf4df66713c_s390x",
"product_id": "registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:2d1bb2935a4c90bf9ca6b22a11a07fcaba002f2020d0ea15b82a7cf4df66713c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/multicloud-manager-rhel9@sha256%3A2d1bb2935a4c90bf9ca6b22a11a07fcaba002f2020d0ea15b82a7cf4df66713c?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769744081"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/placement-rhel9@sha256:2eb424b36226bec87b5277eea7f5ff288409a49f99c3f60ab795bf39a07af7c1_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/placement-rhel9@sha256:2eb424b36226bec87b5277eea7f5ff288409a49f99c3f60ab795bf39a07af7c1_s390x",
"product_id": "registry.redhat.io/multicluster-engine/placement-rhel9@sha256:2eb424b36226bec87b5277eea7f5ff288409a49f99c3f60ab795bf39a07af7c1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/placement-rhel9@sha256%3A2eb424b36226bec87b5277eea7f5ff288409a49f99c3f60ab795bf39a07af7c1?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769693820"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:3ec58884225aa63c85639cda97c4d7c57c7ca505c885e9a5bcbbe14bd6fc82c6_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:3ec58884225aa63c85639cda97c4d7c57c7ca505c885e9a5bcbbe14bd6fc82c6_s390x",
"product_id": "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:3ec58884225aa63c85639cda97c4d7c57c7ca505c885e9a5bcbbe14bd6fc82c6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/provider-credential-controller-rhel9@sha256%3A3ec58884225aa63c85639cda97c4d7c57c7ca505c885e9a5bcbbe14bd6fc82c6?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1770161905"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b00b82b23fbabbf3dceaca70c0bb583405ef105cbd21037dd992c2461368bd2_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b00b82b23fbabbf3dceaca70c0bb583405ef105cbd21037dd992c2461368bd2_s390x",
"product_id": "registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b00b82b23fbabbf3dceaca70c0bb583405ef105cbd21037dd992c2461368bd2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/registration-rhel9@sha256%3A1b00b82b23fbabbf3dceaca70c0bb583405ef105cbd21037dd992c2461368bd2?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769693823"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:c8bde9c9afc34300b7193a8b9ad1c103efd8945b350ab007d9ca6d515ac9c007_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:c8bde9c9afc34300b7193a8b9ad1c103efd8945b350ab007d9ca6d515ac9c007_s390x",
"product_id": "registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:c8bde9c9afc34300b7193a8b9ad1c103efd8945b350ab007d9ca6d515ac9c007_s390x",
"product_identification_helper": {
"purl": "pkg:oci/registration-operator-rhel9@sha256%3Ac8bde9c9afc34300b7193a8b9ad1c103efd8945b350ab007d9ca6d515ac9c007?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769693820"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/multicluster-engine/work-rhel9@sha256:bb19a56cdf094216cc7a4398ce76d0e53081a6a1ce6a05af5951ac3099af84e0_s390x",
"product": {
"name": "registry.redhat.io/multicluster-engine/work-rhel9@sha256:bb19a56cdf094216cc7a4398ce76d0e53081a6a1ce6a05af5951ac3099af84e0_s390x",
"product_id": "registry.redhat.io/multicluster-engine/work-rhel9@sha256:bb19a56cdf094216cc7a4398ce76d0e53081a6a1ce6a05af5951ac3099af84e0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/work-rhel9@sha256%3Abb19a56cdf094216cc7a4398ce76d0e53081a6a1ce6a05af5951ac3099af84e0?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1769693824"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:bcf5e63aba5e78b6a41dadcf73b70dc9940380c232cc2931b5da3ddfe2ecf8fc_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:bcf5e63aba5e78b6a41dadcf73b70dc9940380c232cc2931b5da3ddfe2ecf8fc_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:bcf5e63aba5e78b6a41dadcf73b70dc9940380c232cc2931b5da3ddfe2ecf8fc_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:cc10845b259f7ac1cae5b254e090d52fb9278c89d07b0b7d44a8f6f704ec6272_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:cc10845b259f7ac1cae5b254e090d52fb9278c89d07b0b7d44a8f6f704ec6272_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:cc10845b259f7ac1cae5b254e090d52fb9278c89d07b0b7d44a8f6f704ec6272_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:de69593578d899842a0e98781f9c3d58338ee0925fa0b6243aedbb569a64cd96_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:de69593578d899842a0e98781f9c3d58338ee0925fa0b6243aedbb569a64cd96_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:de69593578d899842a0e98781f9c3d58338ee0925fa0b6243aedbb569a64cd96_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:e4e7e0b3fc069d4746f6584047f8b40cd774b2556f11c2cabb57923a44ef389d_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:e4e7e0b3fc069d4746f6584047f8b40cd774b2556f11c2cabb57923a44ef389d_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:e4e7e0b3fc069d4746f6584047f8b40cd774b2556f11c2cabb57923a44ef389d_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:10981e0c7a156dbfd3b8cec809c618773f3d7806a2a24c0fb1cda2e93ed6ae98_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:10981e0c7a156dbfd3b8cec809c618773f3d7806a2a24c0fb1cda2e93ed6ae98_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:10981e0c7a156dbfd3b8cec809c618773f3d7806a2a24c0fb1cda2e93ed6ae98_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:31f187246ac7da245c160b3afc5f1187d82cd2c039f85111a338165407d7d49d_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:31f187246ac7da245c160b3afc5f1187d82cd2c039f85111a338165407d7d49d_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:31f187246ac7da245c160b3afc5f1187d82cd2c039f85111a338165407d7d49d_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:a498c21c46341a168e51b133e07cd390d7440c3d949ac4107cd829c5b30a4614_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:a498c21c46341a168e51b133e07cd390d7440c3d949ac4107cd829c5b30a4614_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:a498c21c46341a168e51b133e07cd390d7440c3d949ac4107cd829c5b30a4614_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:fd7b341a1e55aec25f6e3221f03d140561be81a230590907dd74fe1a021df006_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:fd7b341a1e55aec25f6e3221f03d140561be81a230590907dd74fe1a021df006_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:fd7b341a1e55aec25f6e3221f03d140561be81a230590907dd74fe1a021df006_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:0180391fe4bca530eb5678bf95922d10365b286279b966136b67bf8d83a9a18c_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:0180391fe4bca530eb5678bf95922d10365b286279b966136b67bf8d83a9a18c_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:0180391fe4bca530eb5678bf95922d10365b286279b966136b67bf8d83a9a18c_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:4ea287235d5dbf2385f4d217690b54cd5ce56820735ae96d66ea03d86d4426c3_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:4ea287235d5dbf2385f4d217690b54cd5ce56820735ae96d66ea03d86d4426c3_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:4ea287235d5dbf2385f4d217690b54cd5ce56820735ae96d66ea03d86d4426c3_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:6eec1cff0d514e343599e9c3ca7b7aa2cbff307a28e45b19364a534be4f89dd1_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:6eec1cff0d514e343599e9c3ca7b7aa2cbff307a28e45b19364a534be4f89dd1_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:6eec1cff0d514e343599e9c3ca7b7aa2cbff307a28e45b19364a534be4f89dd1_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:e9d1e97601e8eaea73943489e782482703310d2e8f22a9fa234b640fcacbe64b_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:e9d1e97601e8eaea73943489e782482703310d2e8f22a9fa234b640fcacbe64b_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:e9d1e97601e8eaea73943489e782482703310d2e8f22a9fa234b640fcacbe64b_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:7b5496adbf0b53964790dbb22c468161e6d873912eacd00b08b955c1314d52a8_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:7b5496adbf0b53964790dbb22c468161e6d873912eacd00b08b955c1314d52a8_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:7b5496adbf0b53964790dbb22c468161e6d873912eacd00b08b955c1314d52a8_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:8d86d2d4ac2459d61a1e493603c9eb7a3f0d584ad53aca2af884bf8bb8b30e71_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:8d86d2d4ac2459d61a1e493603c9eb7a3f0d584ad53aca2af884bf8bb8b30e71_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:8d86d2d4ac2459d61a1e493603c9eb7a3f0d584ad53aca2af884bf8bb8b30e71_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:c39a384c11e5242dc4b25fdd32813b4ff408b188af76df03e9757796fbc7a001_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:c39a384c11e5242dc4b25fdd32813b4ff408b188af76df03e9757796fbc7a001_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:c39a384c11e5242dc4b25fdd32813b4ff408b188af76df03e9757796fbc7a001_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:e0137ca5fd87bc47473fc0fc4c619ea794fac6156d84f7f4fbc689fe3328640e_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:e0137ca5fd87bc47473fc0fc4c619ea794fac6156d84f7f4fbc689fe3328640e_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:e0137ca5fd87bc47473fc0fc4c619ea794fac6156d84f7f4fbc689fe3328640e_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:01a0a5b524624b960339e6d40bc92eaf666532b7905b8b79a31a0ad512336f20_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:01a0a5b524624b960339e6d40bc92eaf666532b7905b8b79a31a0ad512336f20_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:01a0a5b524624b960339e6d40bc92eaf666532b7905b8b79a31a0ad512336f20_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:4285f5036dcf7311bc378bbe350dc33759254999de205929de90a9d218d32f78_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:4285f5036dcf7311bc378bbe350dc33759254999de205929de90a9d218d32f78_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:4285f5036dcf7311bc378bbe350dc33759254999de205929de90a9d218d32f78_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:b2f27f77bcbb85c3a57d40c14928a3922877270f4748cb2d03abfc4300f1925c_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:b2f27f77bcbb85c3a57d40c14928a3922877270f4748cb2d03abfc4300f1925c_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:b2f27f77bcbb85c3a57d40c14928a3922877270f4748cb2d03abfc4300f1925c_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:e5ca54ae610b6fdd062b22d68e04e8c9638a4afe9df3dee7316a09a4a50f929d_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:e5ca54ae610b6fdd062b22d68e04e8c9638a4afe9df3dee7316a09a4a50f929d_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:e5ca54ae610b6fdd062b22d68e04e8c9638a4afe9df3dee7316a09a4a50f929d_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:8f10940b7e9f69bb5f5bb40fb4575f24fc8a2f20916615d6af4eff36b0dc24b2_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:8f10940b7e9f69bb5f5bb40fb4575f24fc8a2f20916615d6af4eff36b0dc24b2_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:8f10940b7e9f69bb5f5bb40fb4575f24fc8a2f20916615d6af4eff36b0dc24b2_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9e4527837150c9054e9f5eb594d557fb4642b86f1dfd109897ea63b5ff5984dd_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9e4527837150c9054e9f5eb594d557fb4642b86f1dfd109897ea63b5ff5984dd_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9e4527837150c9054e9f5eb594d557fb4642b86f1dfd109897ea63b5ff5984dd_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:adfeb1a43a5b626519d6c0aee7cd7986d5afd349a4fae37d0e8821667f7fc6d3_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:adfeb1a43a5b626519d6c0aee7cd7986d5afd349a4fae37d0e8821667f7fc6d3_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:adfeb1a43a5b626519d6c0aee7cd7986d5afd349a4fae37d0e8821667f7fc6d3_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:d9fecb5eebf1127819cf7a3f2c2b63e050cab8864c51d4dbcad4d95921a9b698_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:d9fecb5eebf1127819cf7a3f2c2b63e050cab8864c51d4dbcad4d95921a9b698_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:d9fecb5eebf1127819cf7a3f2c2b63e050cab8864c51d4dbcad4d95921a9b698_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:0bf1c2e7d2204076757c8bbb922e11feacedcefff491bfabf481d4c27f310448_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:0bf1c2e7d2204076757c8bbb922e11feacedcefff491bfabf481d4c27f310448_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:0bf1c2e7d2204076757c8bbb922e11feacedcefff491bfabf481d4c27f310448_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:437680b6193c0cf77c28cb2124e01a33b7dd51063366c5781aeaf339a840b056_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:437680b6193c0cf77c28cb2124e01a33b7dd51063366c5781aeaf339a840b056_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:437680b6193c0cf77c28cb2124e01a33b7dd51063366c5781aeaf339a840b056_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:cc587469525f61858f261cfbf862608aab1509bf3cf5c1e43aea63a19e579728_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:cc587469525f61858f261cfbf862608aab1509bf3cf5c1e43aea63a19e579728_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:cc587469525f61858f261cfbf862608aab1509bf3cf5c1e43aea63a19e579728_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:e7dc46d30ae833d7924260391781b20ffc25693073e1a4b60266caa6bd725f90_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:e7dc46d30ae833d7924260391781b20ffc25693073e1a4b60266caa6bd725f90_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:e7dc46d30ae833d7924260391781b20ffc25693073e1a4b60266caa6bd725f90_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:0712ee64942be9d307a5d89d5333a968092a685fa71c88c7eabe1498e2e3a915_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:0712ee64942be9d307a5d89d5333a968092a685fa71c88c7eabe1498e2e3a915_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:0712ee64942be9d307a5d89d5333a968092a685fa71c88c7eabe1498e2e3a915_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2358f82cbcf6406c86a1ec0f9ccf649dfea143797cd7d112be21c6adfdbf87_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2358f82cbcf6406c86a1ec0f9ccf649dfea143797cd7d112be21c6adfdbf87_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2358f82cbcf6406c86a1ec0f9ccf649dfea143797cd7d112be21c6adfdbf87_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:58d58f838d9fc2ed84635083a00725a47334ee03b8a4282000b69dedddd7a9bd_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:58d58f838d9fc2ed84635083a00725a47334ee03b8a4282000b69dedddd7a9bd_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:58d58f838d9fc2ed84635083a00725a47334ee03b8a4282000b69dedddd7a9bd_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:a6950372d2ab44e865938a37f5c2dfdd55bf02cec1575353538dd28b016700f4_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:a6950372d2ab44e865938a37f5c2dfdd55bf02cec1575353538dd28b016700f4_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:a6950372d2ab44e865938a37f5c2dfdd55bf02cec1575353538dd28b016700f4_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:2fdf436e71fee6739ae6fcd450007d76fc3fa43ba203a809f3337f22d9229bd5_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:2fdf436e71fee6739ae6fcd450007d76fc3fa43ba203a809f3337f22d9229bd5_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:2fdf436e71fee6739ae6fcd450007d76fc3fa43ba203a809f3337f22d9229bd5_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:60751156b9a51d18668dee969963569a998172b0577acaeaecff52970f3c0957_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:60751156b9a51d18668dee969963569a998172b0577acaeaecff52970f3c0957_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:60751156b9a51d18668dee969963569a998172b0577acaeaecff52970f3c0957_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:a86aa371b54e25d0b38ae06aea67577142b227bea31597493639ec0018391a4b_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:a86aa371b54e25d0b38ae06aea67577142b227bea31597493639ec0018391a4b_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:a86aa371b54e25d0b38ae06aea67577142b227bea31597493639ec0018391a4b_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:d0955c18fa4864e073bfb9a61b42261587fc2f5f1b2f29cd0b139be5373b578a_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:d0955c18fa4864e073bfb9a61b42261587fc2f5f1b2f29cd0b139be5373b578a_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:d0955c18fa4864e073bfb9a61b42261587fc2f5f1b2f29cd0b139be5373b578a_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:5e2316240808f561c9ec5b04a57e41776b7efc9a26afa9ae10f7bf7693b30d97_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:5e2316240808f561c9ec5b04a57e41776b7efc9a26afa9ae10f7bf7693b30d97_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:5e2316240808f561c9ec5b04a57e41776b7efc9a26afa9ae10f7bf7693b30d97_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:63be8363c2915b782cd9fc6007b761bc6d3ac9f77bfc35fae1c55c00974058f7_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:63be8363c2915b782cd9fc6007b761bc6d3ac9f77bfc35fae1c55c00974058f7_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:63be8363c2915b782cd9fc6007b761bc6d3ac9f77bfc35fae1c55c00974058f7_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:84d99fc9411e1a8d409d8c6bcd345cfdfee5c5986d6489a2633ffc7d4ad496b4_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:84d99fc9411e1a8d409d8c6bcd345cfdfee5c5986d6489a2633ffc7d4ad496b4_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:84d99fc9411e1a8d409d8c6bcd345cfdfee5c5986d6489a2633ffc7d4ad496b4_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:a3f0cde47e922823ca537e0de8c7ddfed7422be5282e137e4db04d4e3c748104_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:a3f0cde47e922823ca537e0de8c7ddfed7422be5282e137e4db04d4e3c748104_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:a3f0cde47e922823ca537e0de8c7ddfed7422be5282e137e4db04d4e3c748104_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:2acf15b73b6db09469d53c6317088fc5f633f684f8421cc4a09f52d1056a2bb6_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:2acf15b73b6db09469d53c6317088fc5f633f684f8421cc4a09f52d1056a2bb6_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:2acf15b73b6db09469d53c6317088fc5f633f684f8421cc4a09f52d1056a2bb6_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a53abad37395ec507071b894e51a0086b063a1d1d27e4d029b2d3cfb51bc0d14_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a53abad37395ec507071b894e51a0086b063a1d1d27e4d029b2d3cfb51bc0d14_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a53abad37395ec507071b894e51a0086b063a1d1d27e4d029b2d3cfb51bc0d14_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a9871b54bfa689489d578155adb5a483cab73e202c092619e116e71efb476c00_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a9871b54bfa689489d578155adb5a483cab73e202c092619e116e71efb476c00_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a9871b54bfa689489d578155adb5a483cab73e202c092619e116e71efb476c00_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:bf6e25c9b7d66fb0c45c0ebdbbd0ee34b7a9e1cff1ac70128ee7e475812bfa7c_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:bf6e25c9b7d66fb0c45c0ebdbbd0ee34b7a9e1cff1ac70128ee7e475812bfa7c_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:bf6e25c9b7d66fb0c45c0ebdbbd0ee34b7a9e1cff1ac70128ee7e475812bfa7c_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:4955d00cb76f1360a80679973e9d53fcf38a57e0220bc8a29728cd0360327972_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:4955d00cb76f1360a80679973e9d53fcf38a57e0220bc8a29728cd0360327972_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:4955d00cb76f1360a80679973e9d53fcf38a57e0220bc8a29728cd0360327972_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:684094906425b67784bb7f10a152cd15e354bd84a2a2d68178000122bd43794d_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:684094906425b67784bb7f10a152cd15e354bd84a2a2d68178000122bd43794d_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:684094906425b67784bb7f10a152cd15e354bd84a2a2d68178000122bd43794d_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:8794c45c047ad41c71fbd788d35d493a9e4f78c947106391b0f67d3d572b2d06_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:8794c45c047ad41c71fbd788d35d493a9e4f78c947106391b0f67d3d572b2d06_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:8794c45c047ad41c71fbd788d35d493a9e4f78c947106391b0f67d3d572b2d06_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:d0dbcb780c8782e3b1d6abda17255bc45ec4fb5d01e29e8cb3b91bfa0a46c55a_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:d0dbcb780c8782e3b1d6abda17255bc45ec4fb5d01e29e8cb3b91bfa0a46c55a_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:d0dbcb780c8782e3b1d6abda17255bc45ec4fb5d01e29e8cb3b91bfa0a46c55a_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:0a49a64e48aed198f1ead92cd6584bd8b62813dc2621489783b9a62469d7f9e6_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:0a49a64e48aed198f1ead92cd6584bd8b62813dc2621489783b9a62469d7f9e6_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:0a49a64e48aed198f1ead92cd6584bd8b62813dc2621489783b9a62469d7f9e6_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:2c17ef74e6ec8ae3a02268e43d9018eefaafc4493f94de3a8ca6a6fc836be6a4_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:2c17ef74e6ec8ae3a02268e43d9018eefaafc4493f94de3a8ca6a6fc836be6a4_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:2c17ef74e6ec8ae3a02268e43d9018eefaafc4493f94de3a8ca6a6fc836be6a4_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:40a5278bcc8e647aaf16ccca432c4d9bec67ec074569f192420bca529fdaf113_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:40a5278bcc8e647aaf16ccca432c4d9bec67ec074569f192420bca529fdaf113_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:40a5278bcc8e647aaf16ccca432c4d9bec67ec074569f192420bca529fdaf113_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:eafd28f0dd525e4c11b90d01e686ada9bb6ef9e9097e81608df8c04ed15d513b_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:eafd28f0dd525e4c11b90d01e686ada9bb6ef9e9097e81608df8c04ed15d513b_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:eafd28f0dd525e4c11b90d01e686ada9bb6ef9e9097e81608df8c04ed15d513b_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:0f47ceec837a12497ee911279b0fba82481e72ee163670a8674630f948d39aba_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:0f47ceec837a12497ee911279b0fba82481e72ee163670a8674630f948d39aba_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:0f47ceec837a12497ee911279b0fba82481e72ee163670a8674630f948d39aba_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:32166ec828cbc58224e236a86bd7439464379272f473bcdcd2ec765f7081a5b7_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:32166ec828cbc58224e236a86bd7439464379272f473bcdcd2ec765f7081a5b7_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:32166ec828cbc58224e236a86bd7439464379272f473bcdcd2ec765f7081a5b7_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:65c8b3770f82794d55d269a004948a8e2c54cbd99b09552b4cdb91475baee5a2_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:65c8b3770f82794d55d269a004948a8e2c54cbd99b09552b4cdb91475baee5a2_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:65c8b3770f82794d55d269a004948a8e2c54cbd99b09552b4cdb91475baee5a2_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:a3c91540f20f094fee24224bce21018aa671849e7f75aece1bddfb6c945289d2_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:a3c91540f20f094fee24224bce21018aa671849e7f75aece1bddfb6c945289d2_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:a3c91540f20f094fee24224bce21018aa671849e7f75aece1bddfb6c945289d2_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/hive-rhel9@sha256:0b03429102eea10cc0733872bbc946bbfa378966b5d62e32762bd7a59c23e9de_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:0b03429102eea10cc0733872bbc946bbfa378966b5d62e32762bd7a59c23e9de_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/hive-rhel9@sha256:0b03429102eea10cc0733872bbc946bbfa378966b5d62e32762bd7a59c23e9de_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/hive-rhel9@sha256:44e5c0c8674682d03d564fef5e9f668d4ab71e6f27a64ee1bd7a2cf0c47d0db1_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:44e5c0c8674682d03d564fef5e9f668d4ab71e6f27a64ee1bd7a2cf0c47d0db1_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/hive-rhel9@sha256:44e5c0c8674682d03d564fef5e9f668d4ab71e6f27a64ee1bd7a2cf0c47d0db1_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/hive-rhel9@sha256:8422d2c6e47dbb14bc80b03734fd702c57724bf384557e9b9e1a67b85e6b8185_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:8422d2c6e47dbb14bc80b03734fd702c57724bf384557e9b9e1a67b85e6b8185_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/hive-rhel9@sha256:8422d2c6e47dbb14bc80b03734fd702c57724bf384557e9b9e1a67b85e6b8185_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/hive-rhel9@sha256:b95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:b95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/hive-rhel9@sha256:b95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:661171f5a869f110ada60973b2c8289d80df4e7e7373e13bdb68bd5f59be91ea_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:661171f5a869f110ada60973b2c8289d80df4e7e7373e13bdb68bd5f59be91ea_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:661171f5a869f110ada60973b2c8289d80df4e7e7373e13bdb68bd5f59be91ea_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:9c1f70be52ba4c49de28376802bf2d73fe0a3bc44282ace7606cfb123233da4c_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:9c1f70be52ba4c49de28376802bf2d73fe0a3bc44282ace7606cfb123233da4c_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:9c1f70be52ba4c49de28376802bf2d73fe0a3bc44282ace7606cfb123233da4c_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:ced6dbca20663462d35a97ca21836503e9987f29d37896ce8c5fb89650268762_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:ced6dbca20663462d35a97ca21836503e9987f29d37896ce8c5fb89650268762_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:ced6dbca20663462d35a97ca21836503e9987f29d37896ce8c5fb89650268762_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:e374c0aad61fb4a2af3dd0e8310286e45e283dac47c8e766f34cabf1d8cc2563_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:e374c0aad61fb4a2af3dd0e8310286e45e283dac47c8e766f34cabf1d8cc2563_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:e374c0aad61fb4a2af3dd0e8310286e45e283dac47c8e766f34cabf1d8cc2563_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:27f2b11d9017cad3af4f872ce382b54492bae329c499f4423c6ef7342522f844_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:27f2b11d9017cad3af4f872ce382b54492bae329c499f4423c6ef7342522f844_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:27f2b11d9017cad3af4f872ce382b54492bae329c499f4423c6ef7342522f844_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:371f8ec4475c9af90dbaf1a76a6b1217e195d3c371b0903137df92e8733371db_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:371f8ec4475c9af90dbaf1a76a6b1217e195d3c371b0903137df92e8733371db_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:371f8ec4475c9af90dbaf1a76a6b1217e195d3c371b0903137df92e8733371db_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:568aee9b50f1b79b0d3edea5e5a4f877ad8fcfe6f3e81e6f3cf049774dfe4bc9_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:568aee9b50f1b79b0d3edea5e5a4f877ad8fcfe6f3e81e6f3cf049774dfe4bc9_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:568aee9b50f1b79b0d3edea5e5a4f877ad8fcfe6f3e81e6f3cf049774dfe4bc9_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:e20f2aa3083e6d4100b4a38df9b416ac8b0f6a475fffff9754437fe4697dbd94_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:e20f2aa3083e6d4100b4a38df9b416ac8b0f6a475fffff9754437fe4697dbd94_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:e20f2aa3083e6d4100b4a38df9b416ac8b0f6a475fffff9754437fe4697dbd94_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:7d16492d3d30bb614c6155b2a3de1a3cfcd55100c06078c96557831f9c19221c_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:7d16492d3d30bb614c6155b2a3de1a3cfcd55100c06078c96557831f9c19221c_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:7d16492d3d30bb614c6155b2a3de1a3cfcd55100c06078c96557831f9c19221c_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:85f7963a86254181a79cd48a98130c4b0cd50abe6d704940dac5958ab9d11863_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:85f7963a86254181a79cd48a98130c4b0cd50abe6d704940dac5958ab9d11863_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:85f7963a86254181a79cd48a98130c4b0cd50abe6d704940dac5958ab9d11863_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:89a50676a19cc0187665f7c06ddd717a37df80c4b0eccb96447380b7ba2db663_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:89a50676a19cc0187665f7c06ddd717a37df80c4b0eccb96447380b7ba2db663_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:89a50676a19cc0187665f7c06ddd717a37df80c4b0eccb96447380b7ba2db663_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:e6d522327993a91ed50b12745b26db70b5f7b374bb015ef7165ef7c3b59529b4_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:e6d522327993a91ed50b12745b26db70b5f7b374bb015ef7165ef7c3b59529b4_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:e6d522327993a91ed50b12745b26db70b5f7b374bb015ef7165ef7c3b59529b4_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:1052d9b0befb2fd315b445ed4ccca0490075fa82d2752f1507f3daba6476d87a_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:1052d9b0befb2fd315b445ed4ccca0490075fa82d2752f1507f3daba6476d87a_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:1052d9b0befb2fd315b445ed4ccca0490075fa82d2752f1507f3daba6476d87a_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:5511144641603a3fc4c93ae9d7253ba2fccc55f8806913a4e08ec9f3b919d5c8_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:5511144641603a3fc4c93ae9d7253ba2fccc55f8806913a4e08ec9f3b919d5c8_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:5511144641603a3fc4c93ae9d7253ba2fccc55f8806913a4e08ec9f3b919d5c8_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:b8e2d11f40a5a29f0a3fc870dafd8ce6c72e8983f44d5084814b0cc56d410fe7_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:b8e2d11f40a5a29f0a3fc870dafd8ce6c72e8983f44d5084814b0cc56d410fe7_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:b8e2d11f40a5a29f0a3fc870dafd8ce6c72e8983f44d5084814b0cc56d410fe7_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:fd3eb25ba4e8baaf13bdebf9a5c70d20d79a642bccd808c8dfbec52b403a2608_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:fd3eb25ba4e8baaf13bdebf9a5c70d20d79a642bccd808c8dfbec52b403a2608_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:fd3eb25ba4e8baaf13bdebf9a5c70d20d79a642bccd808c8dfbec52b403a2608_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:47265159cef044b5a4086af6506b3ad570d0966d80a5dd0c69d391ced37e2572_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:47265159cef044b5a4086af6506b3ad570d0966d80a5dd0c69d391ced37e2572_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:47265159cef044b5a4086af6506b3ad570d0966d80a5dd0c69d391ced37e2572_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:a6dc13baffa1382bc1316588eba2e63cfc1630d059b3b9ab53dd53c98d135220_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:a6dc13baffa1382bc1316588eba2e63cfc1630d059b3b9ab53dd53c98d135220_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:a6dc13baffa1382bc1316588eba2e63cfc1630d059b3b9ab53dd53c98d135220_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d69051165ba4538e28097a2caa510ae3bab59223e473eb9286763a0c8e2137d2_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d69051165ba4538e28097a2caa510ae3bab59223e473eb9286763a0c8e2137d2_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d69051165ba4538e28097a2caa510ae3bab59223e473eb9286763a0c8e2137d2_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:e04fa41cee83d89a88fc68bc38aadaa69f9c9f30e9a95f19eba299647e5f99bc_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:e04fa41cee83d89a88fc68bc38aadaa69f9c9f30e9a95f19eba299647e5f99bc_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:e04fa41cee83d89a88fc68bc38aadaa69f9c9f30e9a95f19eba299647e5f99bc_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:1e8efca30bc8130a20834ee0dfeff80a62c4b129c2f849492a62f761a684d105_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:1e8efca30bc8130a20834ee0dfeff80a62c4b129c2f849492a62f761a684d105_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:1e8efca30bc8130a20834ee0dfeff80a62c4b129c2f849492a62f761a684d105_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:572430d7b231e93613667d049f11ad8c0570f9cda09b1a0d9c9367a31ada8d86_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:572430d7b231e93613667d049f11ad8c0570f9cda09b1a0d9c9367a31ada8d86_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:572430d7b231e93613667d049f11ad8c0570f9cda09b1a0d9c9367a31ada8d86_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:736ac64d54c2a12dc2234272862e5a52c283dca3273ed2c95cb73167bdc177fa_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:736ac64d54c2a12dc2234272862e5a52c283dca3273ed2c95cb73167bdc177fa_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:736ac64d54c2a12dc2234272862e5a52c283dca3273ed2c95cb73167bdc177fa_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:9c3a0cae8f0998134af791cf690fe6a42783f6caed795c62d67c57ebd849d983_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:9c3a0cae8f0998134af791cf690fe6a42783f6caed795c62d67c57ebd849d983_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:9c3a0cae8f0998134af791cf690fe6a42783f6caed795c62d67c57ebd849d983_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:2ad0563c640566cc6e55ae741b09cd353cdd8a343931596ed1ce93d49e076667_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:2ad0563c640566cc6e55ae741b09cd353cdd8a343931596ed1ce93d49e076667_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:2ad0563c640566cc6e55ae741b09cd353cdd8a343931596ed1ce93d49e076667_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:ba5349debff221eb5e47fac02f60c5d664a32b5cf53a654e3e983ef036acb263_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:ba5349debff221eb5e47fac02f60c5d664a32b5cf53a654e3e983ef036acb263_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:ba5349debff221eb5e47fac02f60c5d664a32b5cf53a654e3e983ef036acb263_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:cd373cc3574546fc2e48a58a3a7e90620494ccb24507337ef1d9a90aaf88d02d_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:cd373cc3574546fc2e48a58a3a7e90620494ccb24507337ef1d9a90aaf88d02d_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:cd373cc3574546fc2e48a58a3a7e90620494ccb24507337ef1d9a90aaf88d02d_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:e448d52eede5096fdb44b6850905a71959e2f90db6fea1cdd17cca941959a9d8_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:e448d52eede5096fdb44b6850905a71959e2f90db6fea1cdd17cca941959a9d8_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:e448d52eede5096fdb44b6850905a71959e2f90db6fea1cdd17cca941959a9d8_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:1136c984617f2a3c71a5b451c5de88f06245a9a9c83783c16a6938b6f7272f80_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:1136c984617f2a3c71a5b451c5de88f06245a9a9c83783c16a6938b6f7272f80_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:1136c984617f2a3c71a5b451c5de88f06245a9a9c83783c16a6938b6f7272f80_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:b7b9c35577b5a91539597fa90c6187e20cdbad70e8ddc55c8dc80058759be711_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:b7b9c35577b5a91539597fa90c6187e20cdbad70e8ddc55c8dc80058759be711_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:b7b9c35577b5a91539597fa90c6187e20cdbad70e8ddc55c8dc80058759be711_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:bdf691c5300034b0331daea8d92f942c3db66aa11fd726d977ae36fec1791695_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:bdf691c5300034b0331daea8d92f942c3db66aa11fd726d977ae36fec1791695_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:bdf691c5300034b0331daea8d92f942c3db66aa11fd726d977ae36fec1791695_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:cc46200f1bd3aa621f80fc5535c917318d50084eea265b22fe1b79871184d7bb_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:cc46200f1bd3aa621f80fc5535c917318d50084eea265b22fe1b79871184d7bb_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:cc46200f1bd3aa621f80fc5535c917318d50084eea265b22fe1b79871184d7bb_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:2d1bb2935a4c90bf9ca6b22a11a07fcaba002f2020d0ea15b82a7cf4df66713c_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:2d1bb2935a4c90bf9ca6b22a11a07fcaba002f2020d0ea15b82a7cf4df66713c_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:2d1bb2935a4c90bf9ca6b22a11a07fcaba002f2020d0ea15b82a7cf4df66713c_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:5d1e7ef39de25f974949e49cbe325783e78071678e30bc3d2311710875dba2bb_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:5d1e7ef39de25f974949e49cbe325783e78071678e30bc3d2311710875dba2bb_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:5d1e7ef39de25f974949e49cbe325783e78071678e30bc3d2311710875dba2bb_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:8b7aa7f81955082085fbf1317ad5d747f4e19ce35c13f17c8f57eb810a1adbf7_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:8b7aa7f81955082085fbf1317ad5d747f4e19ce35c13f17c8f57eb810a1adbf7_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:8b7aa7f81955082085fbf1317ad5d747f4e19ce35c13f17c8f57eb810a1adbf7_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:dc0ffee2f8c96c6ee22a2ddb06d14e08149561bab7b4195d08b59f628870af68_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:dc0ffee2f8c96c6ee22a2ddb06d14e08149561bab7b4195d08b59f628870af68_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:dc0ffee2f8c96c6ee22a2ddb06d14e08149561bab7b4195d08b59f628870af68_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4489ffd456a5d5704dccafc45b523f572f90307e57b8b353f8d8ce4c42706d4f_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4489ffd456a5d5704dccafc45b523f572f90307e57b8b353f8d8ce4c42706d4f_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4489ffd456a5d5704dccafc45b523f572f90307e57b8b353f8d8ce4c42706d4f_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4b6d6e9d9146d9834fb999ee2cbec8c56806d09bce1137bd3869fa125d064f10_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4b6d6e9d9146d9834fb999ee2cbec8c56806d09bce1137bd3869fa125d064f10_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4b6d6e9d9146d9834fb999ee2cbec8c56806d09bce1137bd3869fa125d064f10_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:93147af5126f419ac3fe2a0c95715b76299f27ff642483b2d14b89301367d056_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:93147af5126f419ac3fe2a0c95715b76299f27ff642483b2d14b89301367d056_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:93147af5126f419ac3fe2a0c95715b76299f27ff642483b2d14b89301367d056_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:fea7a807792063cafdd6196fc68e8f7b693d7f123241c6bd64f4a00050f4a5ef_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:fea7a807792063cafdd6196fc68e8f7b693d7f123241c6bd64f4a00050f4a5ef_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:fea7a807792063cafdd6196fc68e8f7b693d7f123241c6bd64f4a00050f4a5ef_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/placement-rhel9@sha256:2eb424b36226bec87b5277eea7f5ff288409a49f99c3f60ab795bf39a07af7c1_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:2eb424b36226bec87b5277eea7f5ff288409a49f99c3f60ab795bf39a07af7c1_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/placement-rhel9@sha256:2eb424b36226bec87b5277eea7f5ff288409a49f99c3f60ab795bf39a07af7c1_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4974b49892263b43d379077d1d44ebf579e4da3700043a9c370e52359d852e7b_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4974b49892263b43d379077d1d44ebf579e4da3700043a9c370e52359d852e7b_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4974b49892263b43d379077d1d44ebf579e4da3700043a9c370e52359d852e7b_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4cafcf98bfde7d9700ea55ef88c183fbf172da5d1bbc57c315df4f0d00591547_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4cafcf98bfde7d9700ea55ef88c183fbf172da5d1bbc57c315df4f0d00591547_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4cafcf98bfde7d9700ea55ef88c183fbf172da5d1bbc57c315df4f0d00591547_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/placement-rhel9@sha256:6f3a3fcf20935e6454baf90004604407c0e205b78d5accc10aefdb03fde0faf6_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:6f3a3fcf20935e6454baf90004604407c0e205b78d5accc10aefdb03fde0faf6_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/placement-rhel9@sha256:6f3a3fcf20935e6454baf90004604407c0e205b78d5accc10aefdb03fde0faf6_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:3ec58884225aa63c85639cda97c4d7c57c7ca505c885e9a5bcbbe14bd6fc82c6_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:3ec58884225aa63c85639cda97c4d7c57c7ca505c885e9a5bcbbe14bd6fc82c6_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:3ec58884225aa63c85639cda97c4d7c57c7ca505c885e9a5bcbbe14bd6fc82c6_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:62fb9dd8ffc2b61de085d39ba2fb0a8192c3634a79b6cf4d9821fdc95efc1fe4_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:62fb9dd8ffc2b61de085d39ba2fb0a8192c3634a79b6cf4d9821fdc95efc1fe4_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:62fb9dd8ffc2b61de085d39ba2fb0a8192c3634a79b6cf4d9821fdc95efc1fe4_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:cfb71cbaeaa7cfa8280e19f89132a8ba8fc2ea84dfb6654975c1176ee1cfac4c_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:cfb71cbaeaa7cfa8280e19f89132a8ba8fc2ea84dfb6654975c1176ee1cfac4c_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:cfb71cbaeaa7cfa8280e19f89132a8ba8fc2ea84dfb6654975c1176ee1cfac4c_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:d23b6e3b510f387235b042dd3e658caab3a3af7386895a53f0967fd8bca77f80_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:d23b6e3b510f387235b042dd3e658caab3a3af7386895a53f0967fd8bca77f80_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:d23b6e3b510f387235b042dd3e658caab3a3af7386895a53f0967fd8bca77f80_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:2d2159059467f0f9f4eb6550d6fe1739193101d784a3098fce4f25b37f3753a7_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:2d2159059467f0f9f4eb6550d6fe1739193101d784a3098fce4f25b37f3753a7_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:2d2159059467f0f9f4eb6550d6fe1739193101d784a3098fce4f25b37f3753a7_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:8839a8851cea3d34dd15274678b6f00a80394308197a877be5505f4af39b62cc_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:8839a8851cea3d34dd15274678b6f00a80394308197a877be5505f4af39b62cc_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:8839a8851cea3d34dd15274678b6f00a80394308197a877be5505f4af39b62cc_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:9133c95a0fefcec77396b1ec04b33024a0e1a3716658de9debeb92a5ffc47f31_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:9133c95a0fefcec77396b1ec04b33024a0e1a3716658de9debeb92a5ffc47f31_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:9133c95a0fefcec77396b1ec04b33024a0e1a3716658de9debeb92a5ffc47f31_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:c8bde9c9afc34300b7193a8b9ad1c103efd8945b350ab007d9ca6d515ac9c007_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:c8bde9c9afc34300b7193a8b9ad1c103efd8945b350ab007d9ca6d515ac9c007_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:c8bde9c9afc34300b7193a8b9ad1c103efd8945b350ab007d9ca6d515ac9c007_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/registration-rhel9@sha256:05094b109396ae9f2a5f346602051a7310000d08890540d1fdef3712455f51c0_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:05094b109396ae9f2a5f346602051a7310000d08890540d1fdef3712455f51c0_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/registration-rhel9@sha256:05094b109396ae9f2a5f346602051a7310000d08890540d1fdef3712455f51c0_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b00b82b23fbabbf3dceaca70c0bb583405ef105cbd21037dd992c2461368bd2_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b00b82b23fbabbf3dceaca70c0bb583405ef105cbd21037dd992c2461368bd2_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b00b82b23fbabbf3dceaca70c0bb583405ef105cbd21037dd992c2461368bd2_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b222fa278dcff0824bc0340e27b6182ffc04506e54d99048f5c01c6bc604ad7_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b222fa278dcff0824bc0340e27b6182ffc04506e54d99048f5c01c6bc604ad7_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b222fa278dcff0824bc0340e27b6182ffc04506e54d99048f5c01c6bc604ad7_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/registration-rhel9@sha256:cc032f7a173f50c51872ddbf9a9c17fa51b7fd91cb3e7b8aeba378c2725043de_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:cc032f7a173f50c51872ddbf9a9c17fa51b7fd91cb3e7b8aeba378c2725043de_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/registration-rhel9@sha256:cc032f7a173f50c51872ddbf9a9c17fa51b7fd91cb3e7b8aeba378c2725043de_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/work-rhel9@sha256:244bd3fa3c960a9eee6d978fe9291d7b112daf2f5516840292fd0298acee5ac1_arm64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:244bd3fa3c960a9eee6d978fe9291d7b112daf2f5516840292fd0298acee5ac1_arm64"
},
"product_reference": "registry.redhat.io/multicluster-engine/work-rhel9@sha256:244bd3fa3c960a9eee6d978fe9291d7b112daf2f5516840292fd0298acee5ac1_arm64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/work-rhel9@sha256:aba46c2c0e3ab613120a479c75f9dde8c772e7ec24034886371665c5c6b2fa8d_ppc64le as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:aba46c2c0e3ab613120a479c75f9dde8c772e7ec24034886371665c5c6b2fa8d_ppc64le"
},
"product_reference": "registry.redhat.io/multicluster-engine/work-rhel9@sha256:aba46c2c0e3ab613120a479c75f9dde8c772e7ec24034886371665c5c6b2fa8d_ppc64le",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/work-rhel9@sha256:bb19a56cdf094216cc7a4398ce76d0e53081a6a1ce6a05af5951ac3099af84e0_s390x as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:bb19a56cdf094216cc7a4398ce76d0e53081a6a1ce6a05af5951ac3099af84e0_s390x"
},
"product_reference": "registry.redhat.io/multicluster-engine/work-rhel9@sha256:bb19a56cdf094216cc7a4398ce76d0e53081a6a1ce6a05af5951ac3099af84e0_s390x",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/multicluster-engine/work-rhel9@sha256:f9c0e9e31a1aeddfefb4f24f7dd70971c1e32d6c4ac99745f81ea63afb526823_amd64 as a component of multicluster engine for Kubernetes 2.9",
"product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:f9c0e9e31a1aeddfefb4f24f7dd70971c1e32d6c4ac99745f81ea63afb526823_amd64"
},
"product_reference": "registry.redhat.io/multicluster-engine/work-rhel9@sha256:f9c0e9e31a1aeddfefb4f24f7dd70971c1e32d6c4ac99745f81ea63afb526823_amd64",
"relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47907",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2025-08-07T16:01:06.247481+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:bcf5e63aba5e78b6a41dadcf73b70dc9940380c232cc2931b5da3ddfe2ecf8fc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:cc10845b259f7ac1cae5b254e090d52fb9278c89d07b0b7d44a8f6f704ec6272_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:de69593578d899842a0e98781f9c3d58338ee0925fa0b6243aedbb569a64cd96_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:e4e7e0b3fc069d4746f6584047f8b40cd774b2556f11c2cabb57923a44ef389d_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:10981e0c7a156dbfd3b8cec809c618773f3d7806a2a24c0fb1cda2e93ed6ae98_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:31f187246ac7da245c160b3afc5f1187d82cd2c039f85111a338165407d7d49d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:a498c21c46341a168e51b133e07cd390d7440c3d949ac4107cd829c5b30a4614_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:fd7b341a1e55aec25f6e3221f03d140561be81a230590907dd74fe1a021df006_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:0180391fe4bca530eb5678bf95922d10365b286279b966136b67bf8d83a9a18c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:4ea287235d5dbf2385f4d217690b54cd5ce56820735ae96d66ea03d86d4426c3_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:6eec1cff0d514e343599e9c3ca7b7aa2cbff307a28e45b19364a534be4f89dd1_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:e9d1e97601e8eaea73943489e782482703310d2e8f22a9fa234b640fcacbe64b_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:7b5496adbf0b53964790dbb22c468161e6d873912eacd00b08b955c1314d52a8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:8d86d2d4ac2459d61a1e493603c9eb7a3f0d584ad53aca2af884bf8bb8b30e71_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:c39a384c11e5242dc4b25fdd32813b4ff408b188af76df03e9757796fbc7a001_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:e0137ca5fd87bc47473fc0fc4c619ea794fac6156d84f7f4fbc689fe3328640e_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:01a0a5b524624b960339e6d40bc92eaf666532b7905b8b79a31a0ad512336f20_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:4285f5036dcf7311bc378bbe350dc33759254999de205929de90a9d218d32f78_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:b2f27f77bcbb85c3a57d40c14928a3922877270f4748cb2d03abfc4300f1925c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:e5ca54ae610b6fdd062b22d68e04e8c9638a4afe9df3dee7316a09a4a50f929d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:8f10940b7e9f69bb5f5bb40fb4575f24fc8a2f20916615d6af4eff36b0dc24b2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9e4527837150c9054e9f5eb594d557fb4642b86f1dfd109897ea63b5ff5984dd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:adfeb1a43a5b626519d6c0aee7cd7986d5afd349a4fae37d0e8821667f7fc6d3_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:d9fecb5eebf1127819cf7a3f2c2b63e050cab8864c51d4dbcad4d95921a9b698_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:2fdf436e71fee6739ae6fcd450007d76fc3fa43ba203a809f3337f22d9229bd5_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:60751156b9a51d18668dee969963569a998172b0577acaeaecff52970f3c0957_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:a86aa371b54e25d0b38ae06aea67577142b227bea31597493639ec0018391a4b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:d0955c18fa4864e073bfb9a61b42261587fc2f5f1b2f29cd0b139be5373b578a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:5e2316240808f561c9ec5b04a57e41776b7efc9a26afa9ae10f7bf7693b30d97_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:63be8363c2915b782cd9fc6007b761bc6d3ac9f77bfc35fae1c55c00974058f7_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:84d99fc9411e1a8d409d8c6bcd345cfdfee5c5986d6489a2633ffc7d4ad496b4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:a3f0cde47e922823ca537e0de8c7ddfed7422be5282e137e4db04d4e3c748104_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:4955d00cb76f1360a80679973e9d53fcf38a57e0220bc8a29728cd0360327972_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:684094906425b67784bb7f10a152cd15e354bd84a2a2d68178000122bd43794d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:8794c45c047ad41c71fbd788d35d493a9e4f78c947106391b0f67d3d572b2d06_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:d0dbcb780c8782e3b1d6abda17255bc45ec4fb5d01e29e8cb3b91bfa0a46c55a_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:0a49a64e48aed198f1ead92cd6584bd8b62813dc2621489783b9a62469d7f9e6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:2c17ef74e6ec8ae3a02268e43d9018eefaafc4493f94de3a8ca6a6fc836be6a4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:40a5278bcc8e647aaf16ccca432c4d9bec67ec074569f192420bca529fdaf113_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:eafd28f0dd525e4c11b90d01e686ada9bb6ef9e9097e81608df8c04ed15d513b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:0f47ceec837a12497ee911279b0fba82481e72ee163670a8674630f948d39aba_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:32166ec828cbc58224e236a86bd7439464379272f473bcdcd2ec765f7081a5b7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:65c8b3770f82794d55d269a004948a8e2c54cbd99b09552b4cdb91475baee5a2_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:a3c91540f20f094fee24224bce21018aa671849e7f75aece1bddfb6c945289d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:0b03429102eea10cc0733872bbc946bbfa378966b5d62e32762bd7a59c23e9de_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:44e5c0c8674682d03d564fef5e9f668d4ab71e6f27a64ee1bd7a2cf0c47d0db1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:8422d2c6e47dbb14bc80b03734fd702c57724bf384557e9b9e1a67b85e6b8185_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:b95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:661171f5a869f110ada60973b2c8289d80df4e7e7373e13bdb68bd5f59be91ea_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:9c1f70be52ba4c49de28376802bf2d73fe0a3bc44282ace7606cfb123233da4c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:ced6dbca20663462d35a97ca21836503e9987f29d37896ce8c5fb89650268762_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:e374c0aad61fb4a2af3dd0e8310286e45e283dac47c8e766f34cabf1d8cc2563_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:27f2b11d9017cad3af4f872ce382b54492bae329c499f4423c6ef7342522f844_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:371f8ec4475c9af90dbaf1a76a6b1217e195d3c371b0903137df92e8733371db_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:568aee9b50f1b79b0d3edea5e5a4f877ad8fcfe6f3e81e6f3cf049774dfe4bc9_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:e20f2aa3083e6d4100b4a38df9b416ac8b0f6a475fffff9754437fe4697dbd94_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:7d16492d3d30bb614c6155b2a3de1a3cfcd55100c06078c96557831f9c19221c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:85f7963a86254181a79cd48a98130c4b0cd50abe6d704940dac5958ab9d11863_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:89a50676a19cc0187665f7c06ddd717a37df80c4b0eccb96447380b7ba2db663_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:e6d522327993a91ed50b12745b26db70b5f7b374bb015ef7165ef7c3b59529b4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:1052d9b0befb2fd315b445ed4ccca0490075fa82d2752f1507f3daba6476d87a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:5511144641603a3fc4c93ae9d7253ba2fccc55f8806913a4e08ec9f3b919d5c8_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:b8e2d11f40a5a29f0a3fc870dafd8ce6c72e8983f44d5084814b0cc56d410fe7_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:fd3eb25ba4e8baaf13bdebf9a5c70d20d79a642bccd808c8dfbec52b403a2608_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:47265159cef044b5a4086af6506b3ad570d0966d80a5dd0c69d391ced37e2572_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:a6dc13baffa1382bc1316588eba2e63cfc1630d059b3b9ab53dd53c98d135220_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d69051165ba4538e28097a2caa510ae3bab59223e473eb9286763a0c8e2137d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:e04fa41cee83d89a88fc68bc38aadaa69f9c9f30e9a95f19eba299647e5f99bc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:1e8efca30bc8130a20834ee0dfeff80a62c4b129c2f849492a62f761a684d105_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:572430d7b231e93613667d049f11ad8c0570f9cda09b1a0d9c9367a31ada8d86_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:736ac64d54c2a12dc2234272862e5a52c283dca3273ed2c95cb73167bdc177fa_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:9c3a0cae8f0998134af791cf690fe6a42783f6caed795c62d67c57ebd849d983_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:2ad0563c640566cc6e55ae741b09cd353cdd8a343931596ed1ce93d49e076667_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:ba5349debff221eb5e47fac02f60c5d664a32b5cf53a654e3e983ef036acb263_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:cd373cc3574546fc2e48a58a3a7e90620494ccb24507337ef1d9a90aaf88d02d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:e448d52eede5096fdb44b6850905a71959e2f90db6fea1cdd17cca941959a9d8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:1136c984617f2a3c71a5b451c5de88f06245a9a9c83783c16a6938b6f7272f80_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:b7b9c35577b5a91539597fa90c6187e20cdbad70e8ddc55c8dc80058759be711_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:bdf691c5300034b0331daea8d92f942c3db66aa11fd726d977ae36fec1791695_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:cc46200f1bd3aa621f80fc5535c917318d50084eea265b22fe1b79871184d7bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:2d1bb2935a4c90bf9ca6b22a11a07fcaba002f2020d0ea15b82a7cf4df66713c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:5d1e7ef39de25f974949e49cbe325783e78071678e30bc3d2311710875dba2bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:8b7aa7f81955082085fbf1317ad5d747f4e19ce35c13f17c8f57eb810a1adbf7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:dc0ffee2f8c96c6ee22a2ddb06d14e08149561bab7b4195d08b59f628870af68_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4489ffd456a5d5704dccafc45b523f572f90307e57b8b353f8d8ce4c42706d4f_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4b6d6e9d9146d9834fb999ee2cbec8c56806d09bce1137bd3869fa125d064f10_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:93147af5126f419ac3fe2a0c95715b76299f27ff642483b2d14b89301367d056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:fea7a807792063cafdd6196fc68e8f7b693d7f123241c6bd64f4a00050f4a5ef_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:2eb424b36226bec87b5277eea7f5ff288409a49f99c3f60ab795bf39a07af7c1_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4974b49892263b43d379077d1d44ebf579e4da3700043a9c370e52359d852e7b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4cafcf98bfde7d9700ea55ef88c183fbf172da5d1bbc57c315df4f0d00591547_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:6f3a3fcf20935e6454baf90004604407c0e205b78d5accc10aefdb03fde0faf6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:2d2159059467f0f9f4eb6550d6fe1739193101d784a3098fce4f25b37f3753a7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:8839a8851cea3d34dd15274678b6f00a80394308197a877be5505f4af39b62cc_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:9133c95a0fefcec77396b1ec04b33024a0e1a3716658de9debeb92a5ffc47f31_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:c8bde9c9afc34300b7193a8b9ad1c103efd8945b350ab007d9ca6d515ac9c007_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:05094b109396ae9f2a5f346602051a7310000d08890540d1fdef3712455f51c0_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b00b82b23fbabbf3dceaca70c0bb583405ef105cbd21037dd992c2461368bd2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b222fa278dcff0824bc0340e27b6182ffc04506e54d99048f5c01c6bc604ad7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:cc032f7a173f50c51872ddbf9a9c17fa51b7fd91cb3e7b8aeba378c2725043de_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:244bd3fa3c960a9eee6d978fe9291d7b112daf2f5516840292fd0298acee5ac1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:aba46c2c0e3ab613120a479c75f9dde8c772e7ec24034886371665c5c6b2fa8d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:bb19a56cdf094216cc7a4398ce76d0e53081a6a1ce6a05af5951ac3099af84e0_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:f9c0e9e31a1aeddfefb4f24f7dd70971c1e32d6c4ac99745f81ea63afb526823_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2387083"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in database/sql. Concurrent queries can produce unexpected results when a query is cancelled during a Scan method call on returned Rows, creating a race condition. This vulnerability allows an attacker who can initiate and cancel queries to trigger this condition, possibly leading to inconsistent data being returned to the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "database/sql: Postgres Scan Race Condition",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability marked as Moderate severity issues rather than Important. The os/exec LookPath flaw requires a misconfigured PATH to be exploitable, and the database/sql race condition primarily impacts applications that cancel queries while running multiple queries concurrently. Both can cause unexpected behavior, but the exploitation scope is limited and unlikely to result in direct compromise in most typical deployments.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:0bf1c2e7d2204076757c8bbb922e11feacedcefff491bfabf481d4c27f310448_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:437680b6193c0cf77c28cb2124e01a33b7dd51063366c5781aeaf339a840b056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:cc587469525f61858f261cfbf862608aab1509bf3cf5c1e43aea63a19e579728_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:e7dc46d30ae833d7924260391781b20ffc25693073e1a4b60266caa6bd725f90_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:0712ee64942be9d307a5d89d5333a968092a685fa71c88c7eabe1498e2e3a915_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2358f82cbcf6406c86a1ec0f9ccf649dfea143797cd7d112be21c6adfdbf87_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:58d58f838d9fc2ed84635083a00725a47334ee03b8a4282000b69dedddd7a9bd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:a6950372d2ab44e865938a37f5c2dfdd55bf02cec1575353538dd28b016700f4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:2acf15b73b6db09469d53c6317088fc5f633f684f8421cc4a09f52d1056a2bb6_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a53abad37395ec507071b894e51a0086b063a1d1d27e4d029b2d3cfb51bc0d14_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a9871b54bfa689489d578155adb5a483cab73e202c092619e116e71efb476c00_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:bf6e25c9b7d66fb0c45c0ebdbbd0ee34b7a9e1cff1ac70128ee7e475812bfa7c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:3ec58884225aa63c85639cda97c4d7c57c7ca505c885e9a5bcbbe14bd6fc82c6_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:62fb9dd8ffc2b61de085d39ba2fb0a8192c3634a79b6cf4d9821fdc95efc1fe4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:cfb71cbaeaa7cfa8280e19f89132a8ba8fc2ea84dfb6654975c1176ee1cfac4c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:d23b6e3b510f387235b042dd3e658caab3a3af7386895a53f0967fd8bca77f80_amd64"
],
"known_not_affected": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:bcf5e63aba5e78b6a41dadcf73b70dc9940380c232cc2931b5da3ddfe2ecf8fc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:cc10845b259f7ac1cae5b254e090d52fb9278c89d07b0b7d44a8f6f704ec6272_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:de69593578d899842a0e98781f9c3d58338ee0925fa0b6243aedbb569a64cd96_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:e4e7e0b3fc069d4746f6584047f8b40cd774b2556f11c2cabb57923a44ef389d_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:10981e0c7a156dbfd3b8cec809c618773f3d7806a2a24c0fb1cda2e93ed6ae98_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:31f187246ac7da245c160b3afc5f1187d82cd2c039f85111a338165407d7d49d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:a498c21c46341a168e51b133e07cd390d7440c3d949ac4107cd829c5b30a4614_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:fd7b341a1e55aec25f6e3221f03d140561be81a230590907dd74fe1a021df006_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:0180391fe4bca530eb5678bf95922d10365b286279b966136b67bf8d83a9a18c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:4ea287235d5dbf2385f4d217690b54cd5ce56820735ae96d66ea03d86d4426c3_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:6eec1cff0d514e343599e9c3ca7b7aa2cbff307a28e45b19364a534be4f89dd1_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:e9d1e97601e8eaea73943489e782482703310d2e8f22a9fa234b640fcacbe64b_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:7b5496adbf0b53964790dbb22c468161e6d873912eacd00b08b955c1314d52a8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:8d86d2d4ac2459d61a1e493603c9eb7a3f0d584ad53aca2af884bf8bb8b30e71_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:c39a384c11e5242dc4b25fdd32813b4ff408b188af76df03e9757796fbc7a001_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:e0137ca5fd87bc47473fc0fc4c619ea794fac6156d84f7f4fbc689fe3328640e_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:01a0a5b524624b960339e6d40bc92eaf666532b7905b8b79a31a0ad512336f20_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:4285f5036dcf7311bc378bbe350dc33759254999de205929de90a9d218d32f78_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:b2f27f77bcbb85c3a57d40c14928a3922877270f4748cb2d03abfc4300f1925c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:e5ca54ae610b6fdd062b22d68e04e8c9638a4afe9df3dee7316a09a4a50f929d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:8f10940b7e9f69bb5f5bb40fb4575f24fc8a2f20916615d6af4eff36b0dc24b2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9e4527837150c9054e9f5eb594d557fb4642b86f1dfd109897ea63b5ff5984dd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:adfeb1a43a5b626519d6c0aee7cd7986d5afd349a4fae37d0e8821667f7fc6d3_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:d9fecb5eebf1127819cf7a3f2c2b63e050cab8864c51d4dbcad4d95921a9b698_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:2fdf436e71fee6739ae6fcd450007d76fc3fa43ba203a809f3337f22d9229bd5_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:60751156b9a51d18668dee969963569a998172b0577acaeaecff52970f3c0957_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:a86aa371b54e25d0b38ae06aea67577142b227bea31597493639ec0018391a4b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:d0955c18fa4864e073bfb9a61b42261587fc2f5f1b2f29cd0b139be5373b578a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:5e2316240808f561c9ec5b04a57e41776b7efc9a26afa9ae10f7bf7693b30d97_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:63be8363c2915b782cd9fc6007b761bc6d3ac9f77bfc35fae1c55c00974058f7_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:84d99fc9411e1a8d409d8c6bcd345cfdfee5c5986d6489a2633ffc7d4ad496b4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:a3f0cde47e922823ca537e0de8c7ddfed7422be5282e137e4db04d4e3c748104_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:4955d00cb76f1360a80679973e9d53fcf38a57e0220bc8a29728cd0360327972_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:684094906425b67784bb7f10a152cd15e354bd84a2a2d68178000122bd43794d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:8794c45c047ad41c71fbd788d35d493a9e4f78c947106391b0f67d3d572b2d06_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:d0dbcb780c8782e3b1d6abda17255bc45ec4fb5d01e29e8cb3b91bfa0a46c55a_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:0a49a64e48aed198f1ead92cd6584bd8b62813dc2621489783b9a62469d7f9e6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:2c17ef74e6ec8ae3a02268e43d9018eefaafc4493f94de3a8ca6a6fc836be6a4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:40a5278bcc8e647aaf16ccca432c4d9bec67ec074569f192420bca529fdaf113_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:eafd28f0dd525e4c11b90d01e686ada9bb6ef9e9097e81608df8c04ed15d513b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:0f47ceec837a12497ee911279b0fba82481e72ee163670a8674630f948d39aba_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:32166ec828cbc58224e236a86bd7439464379272f473bcdcd2ec765f7081a5b7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:65c8b3770f82794d55d269a004948a8e2c54cbd99b09552b4cdb91475baee5a2_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:a3c91540f20f094fee24224bce21018aa671849e7f75aece1bddfb6c945289d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:0b03429102eea10cc0733872bbc946bbfa378966b5d62e32762bd7a59c23e9de_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:44e5c0c8674682d03d564fef5e9f668d4ab71e6f27a64ee1bd7a2cf0c47d0db1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:8422d2c6e47dbb14bc80b03734fd702c57724bf384557e9b9e1a67b85e6b8185_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:b95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:661171f5a869f110ada60973b2c8289d80df4e7e7373e13bdb68bd5f59be91ea_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:9c1f70be52ba4c49de28376802bf2d73fe0a3bc44282ace7606cfb123233da4c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:ced6dbca20663462d35a97ca21836503e9987f29d37896ce8c5fb89650268762_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:e374c0aad61fb4a2af3dd0e8310286e45e283dac47c8e766f34cabf1d8cc2563_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:27f2b11d9017cad3af4f872ce382b54492bae329c499f4423c6ef7342522f844_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:371f8ec4475c9af90dbaf1a76a6b1217e195d3c371b0903137df92e8733371db_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:568aee9b50f1b79b0d3edea5e5a4f877ad8fcfe6f3e81e6f3cf049774dfe4bc9_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:e20f2aa3083e6d4100b4a38df9b416ac8b0f6a475fffff9754437fe4697dbd94_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:7d16492d3d30bb614c6155b2a3de1a3cfcd55100c06078c96557831f9c19221c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:85f7963a86254181a79cd48a98130c4b0cd50abe6d704940dac5958ab9d11863_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:89a50676a19cc0187665f7c06ddd717a37df80c4b0eccb96447380b7ba2db663_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:e6d522327993a91ed50b12745b26db70b5f7b374bb015ef7165ef7c3b59529b4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:1052d9b0befb2fd315b445ed4ccca0490075fa82d2752f1507f3daba6476d87a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:5511144641603a3fc4c93ae9d7253ba2fccc55f8806913a4e08ec9f3b919d5c8_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:b8e2d11f40a5a29f0a3fc870dafd8ce6c72e8983f44d5084814b0cc56d410fe7_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:fd3eb25ba4e8baaf13bdebf9a5c70d20d79a642bccd808c8dfbec52b403a2608_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:47265159cef044b5a4086af6506b3ad570d0966d80a5dd0c69d391ced37e2572_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:a6dc13baffa1382bc1316588eba2e63cfc1630d059b3b9ab53dd53c98d135220_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d69051165ba4538e28097a2caa510ae3bab59223e473eb9286763a0c8e2137d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:e04fa41cee83d89a88fc68bc38aadaa69f9c9f30e9a95f19eba299647e5f99bc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:1e8efca30bc8130a20834ee0dfeff80a62c4b129c2f849492a62f761a684d105_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:572430d7b231e93613667d049f11ad8c0570f9cda09b1a0d9c9367a31ada8d86_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:736ac64d54c2a12dc2234272862e5a52c283dca3273ed2c95cb73167bdc177fa_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:9c3a0cae8f0998134af791cf690fe6a42783f6caed795c62d67c57ebd849d983_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:2ad0563c640566cc6e55ae741b09cd353cdd8a343931596ed1ce93d49e076667_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:ba5349debff221eb5e47fac02f60c5d664a32b5cf53a654e3e983ef036acb263_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:cd373cc3574546fc2e48a58a3a7e90620494ccb24507337ef1d9a90aaf88d02d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:e448d52eede5096fdb44b6850905a71959e2f90db6fea1cdd17cca941959a9d8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:1136c984617f2a3c71a5b451c5de88f06245a9a9c83783c16a6938b6f7272f80_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:b7b9c35577b5a91539597fa90c6187e20cdbad70e8ddc55c8dc80058759be711_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:bdf691c5300034b0331daea8d92f942c3db66aa11fd726d977ae36fec1791695_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:cc46200f1bd3aa621f80fc5535c917318d50084eea265b22fe1b79871184d7bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:2d1bb2935a4c90bf9ca6b22a11a07fcaba002f2020d0ea15b82a7cf4df66713c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:5d1e7ef39de25f974949e49cbe325783e78071678e30bc3d2311710875dba2bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:8b7aa7f81955082085fbf1317ad5d747f4e19ce35c13f17c8f57eb810a1adbf7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:dc0ffee2f8c96c6ee22a2ddb06d14e08149561bab7b4195d08b59f628870af68_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4489ffd456a5d5704dccafc45b523f572f90307e57b8b353f8d8ce4c42706d4f_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4b6d6e9d9146d9834fb999ee2cbec8c56806d09bce1137bd3869fa125d064f10_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:93147af5126f419ac3fe2a0c95715b76299f27ff642483b2d14b89301367d056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:fea7a807792063cafdd6196fc68e8f7b693d7f123241c6bd64f4a00050f4a5ef_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:2eb424b36226bec87b5277eea7f5ff288409a49f99c3f60ab795bf39a07af7c1_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4974b49892263b43d379077d1d44ebf579e4da3700043a9c370e52359d852e7b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4cafcf98bfde7d9700ea55ef88c183fbf172da5d1bbc57c315df4f0d00591547_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:6f3a3fcf20935e6454baf90004604407c0e205b78d5accc10aefdb03fde0faf6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:2d2159059467f0f9f4eb6550d6fe1739193101d784a3098fce4f25b37f3753a7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:8839a8851cea3d34dd15274678b6f00a80394308197a877be5505f4af39b62cc_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:9133c95a0fefcec77396b1ec04b33024a0e1a3716658de9debeb92a5ffc47f31_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:c8bde9c9afc34300b7193a8b9ad1c103efd8945b350ab007d9ca6d515ac9c007_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:05094b109396ae9f2a5f346602051a7310000d08890540d1fdef3712455f51c0_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b00b82b23fbabbf3dceaca70c0bb583405ef105cbd21037dd992c2461368bd2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b222fa278dcff0824bc0340e27b6182ffc04506e54d99048f5c01c6bc604ad7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:cc032f7a173f50c51872ddbf9a9c17fa51b7fd91cb3e7b8aeba378c2725043de_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:244bd3fa3c960a9eee6d978fe9291d7b112daf2f5516840292fd0298acee5ac1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:aba46c2c0e3ab613120a479c75f9dde8c772e7ec24034886371665c5c6b2fa8d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:bb19a56cdf094216cc7a4398ce76d0e53081a6a1ce6a05af5951ac3099af84e0_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:f9c0e9e31a1aeddfefb4f24f7dd70971c1e32d6c4ac99745f81ea63afb526823_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "RHBZ#2387083",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387083"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47907",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47907"
},
{
"category": "external",
"summary": "https://go.dev/cl/693735",
"url": "https://go.dev/cl/693735"
},
{
"category": "external",
"summary": "https://go.dev/issue/74831",
"url": "https://go.dev/issue/74831"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x5MKroML2yM",
"url": "https://groups.google.com/g/golang-announce/c/x5MKroML2yM"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-3849",
"url": "https://pkg.go.dev/vuln/GO-2025-3849"
}
],
"release_date": "2025-08-07T15:25:30.704000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T15:58:30+00:00",
"details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.14/html/clusters/cluster_mce_overview#mce-install-intro",
"product_ids": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:0bf1c2e7d2204076757c8bbb922e11feacedcefff491bfabf481d4c27f310448_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:437680b6193c0cf77c28cb2124e01a33b7dd51063366c5781aeaf339a840b056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:cc587469525f61858f261cfbf862608aab1509bf3cf5c1e43aea63a19e579728_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:e7dc46d30ae833d7924260391781b20ffc25693073e1a4b60266caa6bd725f90_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:0712ee64942be9d307a5d89d5333a968092a685fa71c88c7eabe1498e2e3a915_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2358f82cbcf6406c86a1ec0f9ccf649dfea143797cd7d112be21c6adfdbf87_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:58d58f838d9fc2ed84635083a00725a47334ee03b8a4282000b69dedddd7a9bd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:a6950372d2ab44e865938a37f5c2dfdd55bf02cec1575353538dd28b016700f4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:2acf15b73b6db09469d53c6317088fc5f633f684f8421cc4a09f52d1056a2bb6_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a53abad37395ec507071b894e51a0086b063a1d1d27e4d029b2d3cfb51bc0d14_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a9871b54bfa689489d578155adb5a483cab73e202c092619e116e71efb476c00_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:bf6e25c9b7d66fb0c45c0ebdbbd0ee34b7a9e1cff1ac70128ee7e475812bfa7c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:3ec58884225aa63c85639cda97c4d7c57c7ca505c885e9a5bcbbe14bd6fc82c6_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:62fb9dd8ffc2b61de085d39ba2fb0a8192c3634a79b6cf4d9821fdc95efc1fe4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:cfb71cbaeaa7cfa8280e19f89132a8ba8fc2ea84dfb6654975c1176ee1cfac4c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:d23b6e3b510f387235b042dd3e658caab3a3af7386895a53f0967fd8bca77f80_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2571"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:bcf5e63aba5e78b6a41dadcf73b70dc9940380c232cc2931b5da3ddfe2ecf8fc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:cc10845b259f7ac1cae5b254e090d52fb9278c89d07b0b7d44a8f6f704ec6272_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:de69593578d899842a0e98781f9c3d58338ee0925fa0b6243aedbb569a64cd96_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:e4e7e0b3fc069d4746f6584047f8b40cd774b2556f11c2cabb57923a44ef389d_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:10981e0c7a156dbfd3b8cec809c618773f3d7806a2a24c0fb1cda2e93ed6ae98_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:31f187246ac7da245c160b3afc5f1187d82cd2c039f85111a338165407d7d49d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:a498c21c46341a168e51b133e07cd390d7440c3d949ac4107cd829c5b30a4614_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:fd7b341a1e55aec25f6e3221f03d140561be81a230590907dd74fe1a021df006_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:0180391fe4bca530eb5678bf95922d10365b286279b966136b67bf8d83a9a18c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:4ea287235d5dbf2385f4d217690b54cd5ce56820735ae96d66ea03d86d4426c3_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:6eec1cff0d514e343599e9c3ca7b7aa2cbff307a28e45b19364a534be4f89dd1_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:e9d1e97601e8eaea73943489e782482703310d2e8f22a9fa234b640fcacbe64b_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:7b5496adbf0b53964790dbb22c468161e6d873912eacd00b08b955c1314d52a8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:8d86d2d4ac2459d61a1e493603c9eb7a3f0d584ad53aca2af884bf8bb8b30e71_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:c39a384c11e5242dc4b25fdd32813b4ff408b188af76df03e9757796fbc7a001_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:e0137ca5fd87bc47473fc0fc4c619ea794fac6156d84f7f4fbc689fe3328640e_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:01a0a5b524624b960339e6d40bc92eaf666532b7905b8b79a31a0ad512336f20_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:4285f5036dcf7311bc378bbe350dc33759254999de205929de90a9d218d32f78_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:b2f27f77bcbb85c3a57d40c14928a3922877270f4748cb2d03abfc4300f1925c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:e5ca54ae610b6fdd062b22d68e04e8c9638a4afe9df3dee7316a09a4a50f929d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:8f10940b7e9f69bb5f5bb40fb4575f24fc8a2f20916615d6af4eff36b0dc24b2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9e4527837150c9054e9f5eb594d557fb4642b86f1dfd109897ea63b5ff5984dd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:adfeb1a43a5b626519d6c0aee7cd7986d5afd349a4fae37d0e8821667f7fc6d3_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:d9fecb5eebf1127819cf7a3f2c2b63e050cab8864c51d4dbcad4d95921a9b698_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:0bf1c2e7d2204076757c8bbb922e11feacedcefff491bfabf481d4c27f310448_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:437680b6193c0cf77c28cb2124e01a33b7dd51063366c5781aeaf339a840b056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:cc587469525f61858f261cfbf862608aab1509bf3cf5c1e43aea63a19e579728_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:e7dc46d30ae833d7924260391781b20ffc25693073e1a4b60266caa6bd725f90_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:0712ee64942be9d307a5d89d5333a968092a685fa71c88c7eabe1498e2e3a915_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2358f82cbcf6406c86a1ec0f9ccf649dfea143797cd7d112be21c6adfdbf87_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:58d58f838d9fc2ed84635083a00725a47334ee03b8a4282000b69dedddd7a9bd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:a6950372d2ab44e865938a37f5c2dfdd55bf02cec1575353538dd28b016700f4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:2fdf436e71fee6739ae6fcd450007d76fc3fa43ba203a809f3337f22d9229bd5_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:60751156b9a51d18668dee969963569a998172b0577acaeaecff52970f3c0957_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:a86aa371b54e25d0b38ae06aea67577142b227bea31597493639ec0018391a4b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:d0955c18fa4864e073bfb9a61b42261587fc2f5f1b2f29cd0b139be5373b578a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:5e2316240808f561c9ec5b04a57e41776b7efc9a26afa9ae10f7bf7693b30d97_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:63be8363c2915b782cd9fc6007b761bc6d3ac9f77bfc35fae1c55c00974058f7_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:84d99fc9411e1a8d409d8c6bcd345cfdfee5c5986d6489a2633ffc7d4ad496b4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:a3f0cde47e922823ca537e0de8c7ddfed7422be5282e137e4db04d4e3c748104_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:2acf15b73b6db09469d53c6317088fc5f633f684f8421cc4a09f52d1056a2bb6_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a53abad37395ec507071b894e51a0086b063a1d1d27e4d029b2d3cfb51bc0d14_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a9871b54bfa689489d578155adb5a483cab73e202c092619e116e71efb476c00_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:bf6e25c9b7d66fb0c45c0ebdbbd0ee34b7a9e1cff1ac70128ee7e475812bfa7c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:4955d00cb76f1360a80679973e9d53fcf38a57e0220bc8a29728cd0360327972_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:684094906425b67784bb7f10a152cd15e354bd84a2a2d68178000122bd43794d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:8794c45c047ad41c71fbd788d35d493a9e4f78c947106391b0f67d3d572b2d06_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:d0dbcb780c8782e3b1d6abda17255bc45ec4fb5d01e29e8cb3b91bfa0a46c55a_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:0a49a64e48aed198f1ead92cd6584bd8b62813dc2621489783b9a62469d7f9e6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:2c17ef74e6ec8ae3a02268e43d9018eefaafc4493f94de3a8ca6a6fc836be6a4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:40a5278bcc8e647aaf16ccca432c4d9bec67ec074569f192420bca529fdaf113_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:eafd28f0dd525e4c11b90d01e686ada9bb6ef9e9097e81608df8c04ed15d513b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:0f47ceec837a12497ee911279b0fba82481e72ee163670a8674630f948d39aba_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:32166ec828cbc58224e236a86bd7439464379272f473bcdcd2ec765f7081a5b7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:65c8b3770f82794d55d269a004948a8e2c54cbd99b09552b4cdb91475baee5a2_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:a3c91540f20f094fee24224bce21018aa671849e7f75aece1bddfb6c945289d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:0b03429102eea10cc0733872bbc946bbfa378966b5d62e32762bd7a59c23e9de_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:44e5c0c8674682d03d564fef5e9f668d4ab71e6f27a64ee1bd7a2cf0c47d0db1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:8422d2c6e47dbb14bc80b03734fd702c57724bf384557e9b9e1a67b85e6b8185_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:b95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:661171f5a869f110ada60973b2c8289d80df4e7e7373e13bdb68bd5f59be91ea_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:9c1f70be52ba4c49de28376802bf2d73fe0a3bc44282ace7606cfb123233da4c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:ced6dbca20663462d35a97ca21836503e9987f29d37896ce8c5fb89650268762_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:e374c0aad61fb4a2af3dd0e8310286e45e283dac47c8e766f34cabf1d8cc2563_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:27f2b11d9017cad3af4f872ce382b54492bae329c499f4423c6ef7342522f844_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:371f8ec4475c9af90dbaf1a76a6b1217e195d3c371b0903137df92e8733371db_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:568aee9b50f1b79b0d3edea5e5a4f877ad8fcfe6f3e81e6f3cf049774dfe4bc9_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:e20f2aa3083e6d4100b4a38df9b416ac8b0f6a475fffff9754437fe4697dbd94_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:7d16492d3d30bb614c6155b2a3de1a3cfcd55100c06078c96557831f9c19221c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:85f7963a86254181a79cd48a98130c4b0cd50abe6d704940dac5958ab9d11863_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:89a50676a19cc0187665f7c06ddd717a37df80c4b0eccb96447380b7ba2db663_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:e6d522327993a91ed50b12745b26db70b5f7b374bb015ef7165ef7c3b59529b4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:1052d9b0befb2fd315b445ed4ccca0490075fa82d2752f1507f3daba6476d87a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:5511144641603a3fc4c93ae9d7253ba2fccc55f8806913a4e08ec9f3b919d5c8_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:b8e2d11f40a5a29f0a3fc870dafd8ce6c72e8983f44d5084814b0cc56d410fe7_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:fd3eb25ba4e8baaf13bdebf9a5c70d20d79a642bccd808c8dfbec52b403a2608_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:47265159cef044b5a4086af6506b3ad570d0966d80a5dd0c69d391ced37e2572_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:a6dc13baffa1382bc1316588eba2e63cfc1630d059b3b9ab53dd53c98d135220_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d69051165ba4538e28097a2caa510ae3bab59223e473eb9286763a0c8e2137d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:e04fa41cee83d89a88fc68bc38aadaa69f9c9f30e9a95f19eba299647e5f99bc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:1e8efca30bc8130a20834ee0dfeff80a62c4b129c2f849492a62f761a684d105_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:572430d7b231e93613667d049f11ad8c0570f9cda09b1a0d9c9367a31ada8d86_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:736ac64d54c2a12dc2234272862e5a52c283dca3273ed2c95cb73167bdc177fa_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:9c3a0cae8f0998134af791cf690fe6a42783f6caed795c62d67c57ebd849d983_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:2ad0563c640566cc6e55ae741b09cd353cdd8a343931596ed1ce93d49e076667_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:ba5349debff221eb5e47fac02f60c5d664a32b5cf53a654e3e983ef036acb263_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:cd373cc3574546fc2e48a58a3a7e90620494ccb24507337ef1d9a90aaf88d02d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:e448d52eede5096fdb44b6850905a71959e2f90db6fea1cdd17cca941959a9d8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:1136c984617f2a3c71a5b451c5de88f06245a9a9c83783c16a6938b6f7272f80_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:b7b9c35577b5a91539597fa90c6187e20cdbad70e8ddc55c8dc80058759be711_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:bdf691c5300034b0331daea8d92f942c3db66aa11fd726d977ae36fec1791695_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:cc46200f1bd3aa621f80fc5535c917318d50084eea265b22fe1b79871184d7bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:2d1bb2935a4c90bf9ca6b22a11a07fcaba002f2020d0ea15b82a7cf4df66713c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:5d1e7ef39de25f974949e49cbe325783e78071678e30bc3d2311710875dba2bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:8b7aa7f81955082085fbf1317ad5d747f4e19ce35c13f17c8f57eb810a1adbf7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:dc0ffee2f8c96c6ee22a2ddb06d14e08149561bab7b4195d08b59f628870af68_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4489ffd456a5d5704dccafc45b523f572f90307e57b8b353f8d8ce4c42706d4f_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4b6d6e9d9146d9834fb999ee2cbec8c56806d09bce1137bd3869fa125d064f10_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:93147af5126f419ac3fe2a0c95715b76299f27ff642483b2d14b89301367d056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:fea7a807792063cafdd6196fc68e8f7b693d7f123241c6bd64f4a00050f4a5ef_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:2eb424b36226bec87b5277eea7f5ff288409a49f99c3f60ab795bf39a07af7c1_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4974b49892263b43d379077d1d44ebf579e4da3700043a9c370e52359d852e7b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4cafcf98bfde7d9700ea55ef88c183fbf172da5d1bbc57c315df4f0d00591547_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:6f3a3fcf20935e6454baf90004604407c0e205b78d5accc10aefdb03fde0faf6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:3ec58884225aa63c85639cda97c4d7c57c7ca505c885e9a5bcbbe14bd6fc82c6_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:62fb9dd8ffc2b61de085d39ba2fb0a8192c3634a79b6cf4d9821fdc95efc1fe4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:cfb71cbaeaa7cfa8280e19f89132a8ba8fc2ea84dfb6654975c1176ee1cfac4c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:d23b6e3b510f387235b042dd3e658caab3a3af7386895a53f0967fd8bca77f80_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:2d2159059467f0f9f4eb6550d6fe1739193101d784a3098fce4f25b37f3753a7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:8839a8851cea3d34dd15274678b6f00a80394308197a877be5505f4af39b62cc_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:9133c95a0fefcec77396b1ec04b33024a0e1a3716658de9debeb92a5ffc47f31_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:c8bde9c9afc34300b7193a8b9ad1c103efd8945b350ab007d9ca6d515ac9c007_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:05094b109396ae9f2a5f346602051a7310000d08890540d1fdef3712455f51c0_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b00b82b23fbabbf3dceaca70c0bb583405ef105cbd21037dd992c2461368bd2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b222fa278dcff0824bc0340e27b6182ffc04506e54d99048f5c01c6bc604ad7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:cc032f7a173f50c51872ddbf9a9c17fa51b7fd91cb3e7b8aeba378c2725043de_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:244bd3fa3c960a9eee6d978fe9291d7b112daf2f5516840292fd0298acee5ac1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:aba46c2c0e3ab613120a479c75f9dde8c772e7ec24034886371665c5c6b2fa8d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:bb19a56cdf094216cc7a4398ce76d0e53081a6a1ce6a05af5951ac3099af84e0_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:f9c0e9e31a1aeddfefb4f24f7dd70971c1e32d6c4ac99745f81ea63afb526823_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "database/sql: Postgres Scan Race Condition"
},
{
"cve": "CVE-2025-58183",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-29T23:01:50.573951+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:bcf5e63aba5e78b6a41dadcf73b70dc9940380c232cc2931b5da3ddfe2ecf8fc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:cc10845b259f7ac1cae5b254e090d52fb9278c89d07b0b7d44a8f6f704ec6272_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:de69593578d899842a0e98781f9c3d58338ee0925fa0b6243aedbb569a64cd96_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:e4e7e0b3fc069d4746f6584047f8b40cd774b2556f11c2cabb57923a44ef389d_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:10981e0c7a156dbfd3b8cec809c618773f3d7806a2a24c0fb1cda2e93ed6ae98_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:31f187246ac7da245c160b3afc5f1187d82cd2c039f85111a338165407d7d49d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:a498c21c46341a168e51b133e07cd390d7440c3d949ac4107cd829c5b30a4614_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:fd7b341a1e55aec25f6e3221f03d140561be81a230590907dd74fe1a021df006_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:0180391fe4bca530eb5678bf95922d10365b286279b966136b67bf8d83a9a18c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:4ea287235d5dbf2385f4d217690b54cd5ce56820735ae96d66ea03d86d4426c3_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:6eec1cff0d514e343599e9c3ca7b7aa2cbff307a28e45b19364a534be4f89dd1_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:e9d1e97601e8eaea73943489e782482703310d2e8f22a9fa234b640fcacbe64b_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:7b5496adbf0b53964790dbb22c468161e6d873912eacd00b08b955c1314d52a8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:8d86d2d4ac2459d61a1e493603c9eb7a3f0d584ad53aca2af884bf8bb8b30e71_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:c39a384c11e5242dc4b25fdd32813b4ff408b188af76df03e9757796fbc7a001_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:e0137ca5fd87bc47473fc0fc4c619ea794fac6156d84f7f4fbc689fe3328640e_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:01a0a5b524624b960339e6d40bc92eaf666532b7905b8b79a31a0ad512336f20_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:4285f5036dcf7311bc378bbe350dc33759254999de205929de90a9d218d32f78_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:b2f27f77bcbb85c3a57d40c14928a3922877270f4748cb2d03abfc4300f1925c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:e5ca54ae610b6fdd062b22d68e04e8c9638a4afe9df3dee7316a09a4a50f929d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:8f10940b7e9f69bb5f5bb40fb4575f24fc8a2f20916615d6af4eff36b0dc24b2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9e4527837150c9054e9f5eb594d557fb4642b86f1dfd109897ea63b5ff5984dd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:adfeb1a43a5b626519d6c0aee7cd7986d5afd349a4fae37d0e8821667f7fc6d3_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:d9fecb5eebf1127819cf7a3f2c2b63e050cab8864c51d4dbcad4d95921a9b698_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:0bf1c2e7d2204076757c8bbb922e11feacedcefff491bfabf481d4c27f310448_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:437680b6193c0cf77c28cb2124e01a33b7dd51063366c5781aeaf339a840b056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:cc587469525f61858f261cfbf862608aab1509bf3cf5c1e43aea63a19e579728_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:e7dc46d30ae833d7924260391781b20ffc25693073e1a4b60266caa6bd725f90_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:0712ee64942be9d307a5d89d5333a968092a685fa71c88c7eabe1498e2e3a915_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2358f82cbcf6406c86a1ec0f9ccf649dfea143797cd7d112be21c6adfdbf87_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:58d58f838d9fc2ed84635083a00725a47334ee03b8a4282000b69dedddd7a9bd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:a6950372d2ab44e865938a37f5c2dfdd55bf02cec1575353538dd28b016700f4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:2fdf436e71fee6739ae6fcd450007d76fc3fa43ba203a809f3337f22d9229bd5_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:60751156b9a51d18668dee969963569a998172b0577acaeaecff52970f3c0957_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:a86aa371b54e25d0b38ae06aea67577142b227bea31597493639ec0018391a4b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:d0955c18fa4864e073bfb9a61b42261587fc2f5f1b2f29cd0b139be5373b578a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:2acf15b73b6db09469d53c6317088fc5f633f684f8421cc4a09f52d1056a2bb6_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a53abad37395ec507071b894e51a0086b063a1d1d27e4d029b2d3cfb51bc0d14_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a9871b54bfa689489d578155adb5a483cab73e202c092619e116e71efb476c00_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:bf6e25c9b7d66fb0c45c0ebdbbd0ee34b7a9e1cff1ac70128ee7e475812bfa7c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:4955d00cb76f1360a80679973e9d53fcf38a57e0220bc8a29728cd0360327972_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:684094906425b67784bb7f10a152cd15e354bd84a2a2d68178000122bd43794d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:8794c45c047ad41c71fbd788d35d493a9e4f78c947106391b0f67d3d572b2d06_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:d0dbcb780c8782e3b1d6abda17255bc45ec4fb5d01e29e8cb3b91bfa0a46c55a_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:0a49a64e48aed198f1ead92cd6584bd8b62813dc2621489783b9a62469d7f9e6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:2c17ef74e6ec8ae3a02268e43d9018eefaafc4493f94de3a8ca6a6fc836be6a4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:40a5278bcc8e647aaf16ccca432c4d9bec67ec074569f192420bca529fdaf113_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:eafd28f0dd525e4c11b90d01e686ada9bb6ef9e9097e81608df8c04ed15d513b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:0f47ceec837a12497ee911279b0fba82481e72ee163670a8674630f948d39aba_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:32166ec828cbc58224e236a86bd7439464379272f473bcdcd2ec765f7081a5b7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:65c8b3770f82794d55d269a004948a8e2c54cbd99b09552b4cdb91475baee5a2_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:a3c91540f20f094fee24224bce21018aa671849e7f75aece1bddfb6c945289d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:0b03429102eea10cc0733872bbc946bbfa378966b5d62e32762bd7a59c23e9de_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:44e5c0c8674682d03d564fef5e9f668d4ab71e6f27a64ee1bd7a2cf0c47d0db1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:8422d2c6e47dbb14bc80b03734fd702c57724bf384557e9b9e1a67b85e6b8185_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:b95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:661171f5a869f110ada60973b2c8289d80df4e7e7373e13bdb68bd5f59be91ea_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:9c1f70be52ba4c49de28376802bf2d73fe0a3bc44282ace7606cfb123233da4c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:ced6dbca20663462d35a97ca21836503e9987f29d37896ce8c5fb89650268762_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:e374c0aad61fb4a2af3dd0e8310286e45e283dac47c8e766f34cabf1d8cc2563_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:27f2b11d9017cad3af4f872ce382b54492bae329c499f4423c6ef7342522f844_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:371f8ec4475c9af90dbaf1a76a6b1217e195d3c371b0903137df92e8733371db_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:568aee9b50f1b79b0d3edea5e5a4f877ad8fcfe6f3e81e6f3cf049774dfe4bc9_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:e20f2aa3083e6d4100b4a38df9b416ac8b0f6a475fffff9754437fe4697dbd94_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:7d16492d3d30bb614c6155b2a3de1a3cfcd55100c06078c96557831f9c19221c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:85f7963a86254181a79cd48a98130c4b0cd50abe6d704940dac5958ab9d11863_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:89a50676a19cc0187665f7c06ddd717a37df80c4b0eccb96447380b7ba2db663_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:e6d522327993a91ed50b12745b26db70b5f7b374bb015ef7165ef7c3b59529b4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:1052d9b0befb2fd315b445ed4ccca0490075fa82d2752f1507f3daba6476d87a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:5511144641603a3fc4c93ae9d7253ba2fccc55f8806913a4e08ec9f3b919d5c8_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:b8e2d11f40a5a29f0a3fc870dafd8ce6c72e8983f44d5084814b0cc56d410fe7_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:fd3eb25ba4e8baaf13bdebf9a5c70d20d79a642bccd808c8dfbec52b403a2608_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:47265159cef044b5a4086af6506b3ad570d0966d80a5dd0c69d391ced37e2572_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:a6dc13baffa1382bc1316588eba2e63cfc1630d059b3b9ab53dd53c98d135220_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d69051165ba4538e28097a2caa510ae3bab59223e473eb9286763a0c8e2137d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:e04fa41cee83d89a88fc68bc38aadaa69f9c9f30e9a95f19eba299647e5f99bc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:2ad0563c640566cc6e55ae741b09cd353cdd8a343931596ed1ce93d49e076667_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:ba5349debff221eb5e47fac02f60c5d664a32b5cf53a654e3e983ef036acb263_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:cd373cc3574546fc2e48a58a3a7e90620494ccb24507337ef1d9a90aaf88d02d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:e448d52eede5096fdb44b6850905a71959e2f90db6fea1cdd17cca941959a9d8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:1136c984617f2a3c71a5b451c5de88f06245a9a9c83783c16a6938b6f7272f80_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:b7b9c35577b5a91539597fa90c6187e20cdbad70e8ddc55c8dc80058759be711_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:bdf691c5300034b0331daea8d92f942c3db66aa11fd726d977ae36fec1791695_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:cc46200f1bd3aa621f80fc5535c917318d50084eea265b22fe1b79871184d7bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4489ffd456a5d5704dccafc45b523f572f90307e57b8b353f8d8ce4c42706d4f_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4b6d6e9d9146d9834fb999ee2cbec8c56806d09bce1137bd3869fa125d064f10_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:93147af5126f419ac3fe2a0c95715b76299f27ff642483b2d14b89301367d056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:fea7a807792063cafdd6196fc68e8f7b693d7f123241c6bd64f4a00050f4a5ef_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:2eb424b36226bec87b5277eea7f5ff288409a49f99c3f60ab795bf39a07af7c1_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4974b49892263b43d379077d1d44ebf579e4da3700043a9c370e52359d852e7b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4cafcf98bfde7d9700ea55ef88c183fbf172da5d1bbc57c315df4f0d00591547_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:6f3a3fcf20935e6454baf90004604407c0e205b78d5accc10aefdb03fde0faf6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:3ec58884225aa63c85639cda97c4d7c57c7ca505c885e9a5bcbbe14bd6fc82c6_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:62fb9dd8ffc2b61de085d39ba2fb0a8192c3634a79b6cf4d9821fdc95efc1fe4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:cfb71cbaeaa7cfa8280e19f89132a8ba8fc2ea84dfb6654975c1176ee1cfac4c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:d23b6e3b510f387235b042dd3e658caab3a3af7386895a53f0967fd8bca77f80_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:2d2159059467f0f9f4eb6550d6fe1739193101d784a3098fce4f25b37f3753a7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:8839a8851cea3d34dd15274678b6f00a80394308197a877be5505f4af39b62cc_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:9133c95a0fefcec77396b1ec04b33024a0e1a3716658de9debeb92a5ffc47f31_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:c8bde9c9afc34300b7193a8b9ad1c103efd8945b350ab007d9ca6d515ac9c007_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:05094b109396ae9f2a5f346602051a7310000d08890540d1fdef3712455f51c0_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b00b82b23fbabbf3dceaca70c0bb583405ef105cbd21037dd992c2461368bd2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b222fa278dcff0824bc0340e27b6182ffc04506e54d99048f5c01c6bc604ad7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:cc032f7a173f50c51872ddbf9a9c17fa51b7fd91cb3e7b8aeba378c2725043de_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2407258"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to be able to process a specially crafted GNU tar pax 1.0 archive with the application using the archive/tar package. Additionally, this issue can cause the Go application to allocate a large amount of memory, eventually leading to an out-of-memory condition and resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:5e2316240808f561c9ec5b04a57e41776b7efc9a26afa9ae10f7bf7693b30d97_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:63be8363c2915b782cd9fc6007b761bc6d3ac9f77bfc35fae1c55c00974058f7_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:84d99fc9411e1a8d409d8c6bcd345cfdfee5c5986d6489a2633ffc7d4ad496b4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:a3f0cde47e922823ca537e0de8c7ddfed7422be5282e137e4db04d4e3c748104_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:1e8efca30bc8130a20834ee0dfeff80a62c4b129c2f849492a62f761a684d105_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:572430d7b231e93613667d049f11ad8c0570f9cda09b1a0d9c9367a31ada8d86_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:736ac64d54c2a12dc2234272862e5a52c283dca3273ed2c95cb73167bdc177fa_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:9c3a0cae8f0998134af791cf690fe6a42783f6caed795c62d67c57ebd849d983_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:2d1bb2935a4c90bf9ca6b22a11a07fcaba002f2020d0ea15b82a7cf4df66713c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:5d1e7ef39de25f974949e49cbe325783e78071678e30bc3d2311710875dba2bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:8b7aa7f81955082085fbf1317ad5d747f4e19ce35c13f17c8f57eb810a1adbf7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:dc0ffee2f8c96c6ee22a2ddb06d14e08149561bab7b4195d08b59f628870af68_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:244bd3fa3c960a9eee6d978fe9291d7b112daf2f5516840292fd0298acee5ac1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:aba46c2c0e3ab613120a479c75f9dde8c772e7ec24034886371665c5c6b2fa8d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:bb19a56cdf094216cc7a4398ce76d0e53081a6a1ce6a05af5951ac3099af84e0_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:f9c0e9e31a1aeddfefb4f24f7dd70971c1e32d6c4ac99745f81ea63afb526823_amd64"
],
"known_not_affected": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:bcf5e63aba5e78b6a41dadcf73b70dc9940380c232cc2931b5da3ddfe2ecf8fc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:cc10845b259f7ac1cae5b254e090d52fb9278c89d07b0b7d44a8f6f704ec6272_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:de69593578d899842a0e98781f9c3d58338ee0925fa0b6243aedbb569a64cd96_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:e4e7e0b3fc069d4746f6584047f8b40cd774b2556f11c2cabb57923a44ef389d_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:10981e0c7a156dbfd3b8cec809c618773f3d7806a2a24c0fb1cda2e93ed6ae98_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:31f187246ac7da245c160b3afc5f1187d82cd2c039f85111a338165407d7d49d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:a498c21c46341a168e51b133e07cd390d7440c3d949ac4107cd829c5b30a4614_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:fd7b341a1e55aec25f6e3221f03d140561be81a230590907dd74fe1a021df006_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:0180391fe4bca530eb5678bf95922d10365b286279b966136b67bf8d83a9a18c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:4ea287235d5dbf2385f4d217690b54cd5ce56820735ae96d66ea03d86d4426c3_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:6eec1cff0d514e343599e9c3ca7b7aa2cbff307a28e45b19364a534be4f89dd1_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:e9d1e97601e8eaea73943489e782482703310d2e8f22a9fa234b640fcacbe64b_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:7b5496adbf0b53964790dbb22c468161e6d873912eacd00b08b955c1314d52a8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:8d86d2d4ac2459d61a1e493603c9eb7a3f0d584ad53aca2af884bf8bb8b30e71_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:c39a384c11e5242dc4b25fdd32813b4ff408b188af76df03e9757796fbc7a001_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:e0137ca5fd87bc47473fc0fc4c619ea794fac6156d84f7f4fbc689fe3328640e_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:01a0a5b524624b960339e6d40bc92eaf666532b7905b8b79a31a0ad512336f20_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:4285f5036dcf7311bc378bbe350dc33759254999de205929de90a9d218d32f78_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:b2f27f77bcbb85c3a57d40c14928a3922877270f4748cb2d03abfc4300f1925c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:e5ca54ae610b6fdd062b22d68e04e8c9638a4afe9df3dee7316a09a4a50f929d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:8f10940b7e9f69bb5f5bb40fb4575f24fc8a2f20916615d6af4eff36b0dc24b2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9e4527837150c9054e9f5eb594d557fb4642b86f1dfd109897ea63b5ff5984dd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:adfeb1a43a5b626519d6c0aee7cd7986d5afd349a4fae37d0e8821667f7fc6d3_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:d9fecb5eebf1127819cf7a3f2c2b63e050cab8864c51d4dbcad4d95921a9b698_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:0bf1c2e7d2204076757c8bbb922e11feacedcefff491bfabf481d4c27f310448_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:437680b6193c0cf77c28cb2124e01a33b7dd51063366c5781aeaf339a840b056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:cc587469525f61858f261cfbf862608aab1509bf3cf5c1e43aea63a19e579728_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:e7dc46d30ae833d7924260391781b20ffc25693073e1a4b60266caa6bd725f90_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:0712ee64942be9d307a5d89d5333a968092a685fa71c88c7eabe1498e2e3a915_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2358f82cbcf6406c86a1ec0f9ccf649dfea143797cd7d112be21c6adfdbf87_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:58d58f838d9fc2ed84635083a00725a47334ee03b8a4282000b69dedddd7a9bd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:a6950372d2ab44e865938a37f5c2dfdd55bf02cec1575353538dd28b016700f4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:2fdf436e71fee6739ae6fcd450007d76fc3fa43ba203a809f3337f22d9229bd5_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:60751156b9a51d18668dee969963569a998172b0577acaeaecff52970f3c0957_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:a86aa371b54e25d0b38ae06aea67577142b227bea31597493639ec0018391a4b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:d0955c18fa4864e073bfb9a61b42261587fc2f5f1b2f29cd0b139be5373b578a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:2acf15b73b6db09469d53c6317088fc5f633f684f8421cc4a09f52d1056a2bb6_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a53abad37395ec507071b894e51a0086b063a1d1d27e4d029b2d3cfb51bc0d14_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a9871b54bfa689489d578155adb5a483cab73e202c092619e116e71efb476c00_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:bf6e25c9b7d66fb0c45c0ebdbbd0ee34b7a9e1cff1ac70128ee7e475812bfa7c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:4955d00cb76f1360a80679973e9d53fcf38a57e0220bc8a29728cd0360327972_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:684094906425b67784bb7f10a152cd15e354bd84a2a2d68178000122bd43794d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:8794c45c047ad41c71fbd788d35d493a9e4f78c947106391b0f67d3d572b2d06_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:d0dbcb780c8782e3b1d6abda17255bc45ec4fb5d01e29e8cb3b91bfa0a46c55a_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:0a49a64e48aed198f1ead92cd6584bd8b62813dc2621489783b9a62469d7f9e6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:2c17ef74e6ec8ae3a02268e43d9018eefaafc4493f94de3a8ca6a6fc836be6a4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:40a5278bcc8e647aaf16ccca432c4d9bec67ec074569f192420bca529fdaf113_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:eafd28f0dd525e4c11b90d01e686ada9bb6ef9e9097e81608df8c04ed15d513b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:0f47ceec837a12497ee911279b0fba82481e72ee163670a8674630f948d39aba_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:32166ec828cbc58224e236a86bd7439464379272f473bcdcd2ec765f7081a5b7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:65c8b3770f82794d55d269a004948a8e2c54cbd99b09552b4cdb91475baee5a2_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:a3c91540f20f094fee24224bce21018aa671849e7f75aece1bddfb6c945289d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:0b03429102eea10cc0733872bbc946bbfa378966b5d62e32762bd7a59c23e9de_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:44e5c0c8674682d03d564fef5e9f668d4ab71e6f27a64ee1bd7a2cf0c47d0db1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:8422d2c6e47dbb14bc80b03734fd702c57724bf384557e9b9e1a67b85e6b8185_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:b95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:661171f5a869f110ada60973b2c8289d80df4e7e7373e13bdb68bd5f59be91ea_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:9c1f70be52ba4c49de28376802bf2d73fe0a3bc44282ace7606cfb123233da4c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:ced6dbca20663462d35a97ca21836503e9987f29d37896ce8c5fb89650268762_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:e374c0aad61fb4a2af3dd0e8310286e45e283dac47c8e766f34cabf1d8cc2563_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:27f2b11d9017cad3af4f872ce382b54492bae329c499f4423c6ef7342522f844_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:371f8ec4475c9af90dbaf1a76a6b1217e195d3c371b0903137df92e8733371db_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:568aee9b50f1b79b0d3edea5e5a4f877ad8fcfe6f3e81e6f3cf049774dfe4bc9_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:e20f2aa3083e6d4100b4a38df9b416ac8b0f6a475fffff9754437fe4697dbd94_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:7d16492d3d30bb614c6155b2a3de1a3cfcd55100c06078c96557831f9c19221c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:85f7963a86254181a79cd48a98130c4b0cd50abe6d704940dac5958ab9d11863_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:89a50676a19cc0187665f7c06ddd717a37df80c4b0eccb96447380b7ba2db663_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:e6d522327993a91ed50b12745b26db70b5f7b374bb015ef7165ef7c3b59529b4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:1052d9b0befb2fd315b445ed4ccca0490075fa82d2752f1507f3daba6476d87a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:5511144641603a3fc4c93ae9d7253ba2fccc55f8806913a4e08ec9f3b919d5c8_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:b8e2d11f40a5a29f0a3fc870dafd8ce6c72e8983f44d5084814b0cc56d410fe7_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:fd3eb25ba4e8baaf13bdebf9a5c70d20d79a642bccd808c8dfbec52b403a2608_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:47265159cef044b5a4086af6506b3ad570d0966d80a5dd0c69d391ced37e2572_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:a6dc13baffa1382bc1316588eba2e63cfc1630d059b3b9ab53dd53c98d135220_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d69051165ba4538e28097a2caa510ae3bab59223e473eb9286763a0c8e2137d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:e04fa41cee83d89a88fc68bc38aadaa69f9c9f30e9a95f19eba299647e5f99bc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:2ad0563c640566cc6e55ae741b09cd353cdd8a343931596ed1ce93d49e076667_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:ba5349debff221eb5e47fac02f60c5d664a32b5cf53a654e3e983ef036acb263_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:cd373cc3574546fc2e48a58a3a7e90620494ccb24507337ef1d9a90aaf88d02d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:e448d52eede5096fdb44b6850905a71959e2f90db6fea1cdd17cca941959a9d8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:1136c984617f2a3c71a5b451c5de88f06245a9a9c83783c16a6938b6f7272f80_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:b7b9c35577b5a91539597fa90c6187e20cdbad70e8ddc55c8dc80058759be711_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:bdf691c5300034b0331daea8d92f942c3db66aa11fd726d977ae36fec1791695_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:cc46200f1bd3aa621f80fc5535c917318d50084eea265b22fe1b79871184d7bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4489ffd456a5d5704dccafc45b523f572f90307e57b8b353f8d8ce4c42706d4f_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4b6d6e9d9146d9834fb999ee2cbec8c56806d09bce1137bd3869fa125d064f10_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:93147af5126f419ac3fe2a0c95715b76299f27ff642483b2d14b89301367d056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:fea7a807792063cafdd6196fc68e8f7b693d7f123241c6bd64f4a00050f4a5ef_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:2eb424b36226bec87b5277eea7f5ff288409a49f99c3f60ab795bf39a07af7c1_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4974b49892263b43d379077d1d44ebf579e4da3700043a9c370e52359d852e7b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4cafcf98bfde7d9700ea55ef88c183fbf172da5d1bbc57c315df4f0d00591547_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:6f3a3fcf20935e6454baf90004604407c0e205b78d5accc10aefdb03fde0faf6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:3ec58884225aa63c85639cda97c4d7c57c7ca505c885e9a5bcbbe14bd6fc82c6_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:62fb9dd8ffc2b61de085d39ba2fb0a8192c3634a79b6cf4d9821fdc95efc1fe4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:cfb71cbaeaa7cfa8280e19f89132a8ba8fc2ea84dfb6654975c1176ee1cfac4c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:d23b6e3b510f387235b042dd3e658caab3a3af7386895a53f0967fd8bca77f80_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:2d2159059467f0f9f4eb6550d6fe1739193101d784a3098fce4f25b37f3753a7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:8839a8851cea3d34dd15274678b6f00a80394308197a877be5505f4af39b62cc_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:9133c95a0fefcec77396b1ec04b33024a0e1a3716658de9debeb92a5ffc47f31_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:c8bde9c9afc34300b7193a8b9ad1c103efd8945b350ab007d9ca6d515ac9c007_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:05094b109396ae9f2a5f346602051a7310000d08890540d1fdef3712455f51c0_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b00b82b23fbabbf3dceaca70c0bb583405ef105cbd21037dd992c2461368bd2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b222fa278dcff0824bc0340e27b6182ffc04506e54d99048f5c01c6bc604ad7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:cc032f7a173f50c51872ddbf9a9c17fa51b7fd91cb3e7b8aeba378c2725043de_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "RHBZ#2407258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2407258"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://go.dev/cl/709861",
"url": "https://go.dev/cl/709861"
},
{
"category": "external",
"summary": "https://go.dev/issue/75677",
"url": "https://go.dev/issue/75677"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI",
"url": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4014",
"url": "https://pkg.go.dev/vuln/GO-2025-4014"
}
],
"release_date": "2025-10-29T22:10:14.376000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T15:58:30+00:00",
"details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.14/html/clusters/cluster_mce_overview#mce-install-intro",
"product_ids": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:5e2316240808f561c9ec5b04a57e41776b7efc9a26afa9ae10f7bf7693b30d97_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:63be8363c2915b782cd9fc6007b761bc6d3ac9f77bfc35fae1c55c00974058f7_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:84d99fc9411e1a8d409d8c6bcd345cfdfee5c5986d6489a2633ffc7d4ad496b4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:a3f0cde47e922823ca537e0de8c7ddfed7422be5282e137e4db04d4e3c748104_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:1e8efca30bc8130a20834ee0dfeff80a62c4b129c2f849492a62f761a684d105_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:572430d7b231e93613667d049f11ad8c0570f9cda09b1a0d9c9367a31ada8d86_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:736ac64d54c2a12dc2234272862e5a52c283dca3273ed2c95cb73167bdc177fa_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:9c3a0cae8f0998134af791cf690fe6a42783f6caed795c62d67c57ebd849d983_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:2d1bb2935a4c90bf9ca6b22a11a07fcaba002f2020d0ea15b82a7cf4df66713c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:5d1e7ef39de25f974949e49cbe325783e78071678e30bc3d2311710875dba2bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:8b7aa7f81955082085fbf1317ad5d747f4e19ce35c13f17c8f57eb810a1adbf7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:dc0ffee2f8c96c6ee22a2ddb06d14e08149561bab7b4195d08b59f628870af68_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:244bd3fa3c960a9eee6d978fe9291d7b112daf2f5516840292fd0298acee5ac1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:aba46c2c0e3ab613120a479c75f9dde8c772e7ec24034886371665c5c6b2fa8d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:bb19a56cdf094216cc7a4398ce76d0e53081a6a1ce6a05af5951ac3099af84e0_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:f9c0e9e31a1aeddfefb4f24f7dd70971c1e32d6c4ac99745f81ea63afb526823_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2571"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:bcf5e63aba5e78b6a41dadcf73b70dc9940380c232cc2931b5da3ddfe2ecf8fc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:cc10845b259f7ac1cae5b254e090d52fb9278c89d07b0b7d44a8f6f704ec6272_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:de69593578d899842a0e98781f9c3d58338ee0925fa0b6243aedbb569a64cd96_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:e4e7e0b3fc069d4746f6584047f8b40cd774b2556f11c2cabb57923a44ef389d_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:10981e0c7a156dbfd3b8cec809c618773f3d7806a2a24c0fb1cda2e93ed6ae98_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:31f187246ac7da245c160b3afc5f1187d82cd2c039f85111a338165407d7d49d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:a498c21c46341a168e51b133e07cd390d7440c3d949ac4107cd829c5b30a4614_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:fd7b341a1e55aec25f6e3221f03d140561be81a230590907dd74fe1a021df006_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:0180391fe4bca530eb5678bf95922d10365b286279b966136b67bf8d83a9a18c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:4ea287235d5dbf2385f4d217690b54cd5ce56820735ae96d66ea03d86d4426c3_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:6eec1cff0d514e343599e9c3ca7b7aa2cbff307a28e45b19364a534be4f89dd1_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:e9d1e97601e8eaea73943489e782482703310d2e8f22a9fa234b640fcacbe64b_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:7b5496adbf0b53964790dbb22c468161e6d873912eacd00b08b955c1314d52a8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:8d86d2d4ac2459d61a1e493603c9eb7a3f0d584ad53aca2af884bf8bb8b30e71_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:c39a384c11e5242dc4b25fdd32813b4ff408b188af76df03e9757796fbc7a001_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:e0137ca5fd87bc47473fc0fc4c619ea794fac6156d84f7f4fbc689fe3328640e_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:01a0a5b524624b960339e6d40bc92eaf666532b7905b8b79a31a0ad512336f20_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:4285f5036dcf7311bc378bbe350dc33759254999de205929de90a9d218d32f78_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:b2f27f77bcbb85c3a57d40c14928a3922877270f4748cb2d03abfc4300f1925c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:e5ca54ae610b6fdd062b22d68e04e8c9638a4afe9df3dee7316a09a4a50f929d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:8f10940b7e9f69bb5f5bb40fb4575f24fc8a2f20916615d6af4eff36b0dc24b2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9e4527837150c9054e9f5eb594d557fb4642b86f1dfd109897ea63b5ff5984dd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:adfeb1a43a5b626519d6c0aee7cd7986d5afd349a4fae37d0e8821667f7fc6d3_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:d9fecb5eebf1127819cf7a3f2c2b63e050cab8864c51d4dbcad4d95921a9b698_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:0bf1c2e7d2204076757c8bbb922e11feacedcefff491bfabf481d4c27f310448_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:437680b6193c0cf77c28cb2124e01a33b7dd51063366c5781aeaf339a840b056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:cc587469525f61858f261cfbf862608aab1509bf3cf5c1e43aea63a19e579728_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:e7dc46d30ae833d7924260391781b20ffc25693073e1a4b60266caa6bd725f90_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:0712ee64942be9d307a5d89d5333a968092a685fa71c88c7eabe1498e2e3a915_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2358f82cbcf6406c86a1ec0f9ccf649dfea143797cd7d112be21c6adfdbf87_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:58d58f838d9fc2ed84635083a00725a47334ee03b8a4282000b69dedddd7a9bd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:a6950372d2ab44e865938a37f5c2dfdd55bf02cec1575353538dd28b016700f4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:2fdf436e71fee6739ae6fcd450007d76fc3fa43ba203a809f3337f22d9229bd5_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:60751156b9a51d18668dee969963569a998172b0577acaeaecff52970f3c0957_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:a86aa371b54e25d0b38ae06aea67577142b227bea31597493639ec0018391a4b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:d0955c18fa4864e073bfb9a61b42261587fc2f5f1b2f29cd0b139be5373b578a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:5e2316240808f561c9ec5b04a57e41776b7efc9a26afa9ae10f7bf7693b30d97_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:63be8363c2915b782cd9fc6007b761bc6d3ac9f77bfc35fae1c55c00974058f7_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:84d99fc9411e1a8d409d8c6bcd345cfdfee5c5986d6489a2633ffc7d4ad496b4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:a3f0cde47e922823ca537e0de8c7ddfed7422be5282e137e4db04d4e3c748104_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:2acf15b73b6db09469d53c6317088fc5f633f684f8421cc4a09f52d1056a2bb6_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a53abad37395ec507071b894e51a0086b063a1d1d27e4d029b2d3cfb51bc0d14_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a9871b54bfa689489d578155adb5a483cab73e202c092619e116e71efb476c00_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:bf6e25c9b7d66fb0c45c0ebdbbd0ee34b7a9e1cff1ac70128ee7e475812bfa7c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:4955d00cb76f1360a80679973e9d53fcf38a57e0220bc8a29728cd0360327972_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:684094906425b67784bb7f10a152cd15e354bd84a2a2d68178000122bd43794d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:8794c45c047ad41c71fbd788d35d493a9e4f78c947106391b0f67d3d572b2d06_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:d0dbcb780c8782e3b1d6abda17255bc45ec4fb5d01e29e8cb3b91bfa0a46c55a_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:0a49a64e48aed198f1ead92cd6584bd8b62813dc2621489783b9a62469d7f9e6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:2c17ef74e6ec8ae3a02268e43d9018eefaafc4493f94de3a8ca6a6fc836be6a4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:40a5278bcc8e647aaf16ccca432c4d9bec67ec074569f192420bca529fdaf113_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:eafd28f0dd525e4c11b90d01e686ada9bb6ef9e9097e81608df8c04ed15d513b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:0f47ceec837a12497ee911279b0fba82481e72ee163670a8674630f948d39aba_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:32166ec828cbc58224e236a86bd7439464379272f473bcdcd2ec765f7081a5b7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:65c8b3770f82794d55d269a004948a8e2c54cbd99b09552b4cdb91475baee5a2_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:a3c91540f20f094fee24224bce21018aa671849e7f75aece1bddfb6c945289d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:0b03429102eea10cc0733872bbc946bbfa378966b5d62e32762bd7a59c23e9de_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:44e5c0c8674682d03d564fef5e9f668d4ab71e6f27a64ee1bd7a2cf0c47d0db1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:8422d2c6e47dbb14bc80b03734fd702c57724bf384557e9b9e1a67b85e6b8185_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:b95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:661171f5a869f110ada60973b2c8289d80df4e7e7373e13bdb68bd5f59be91ea_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:9c1f70be52ba4c49de28376802bf2d73fe0a3bc44282ace7606cfb123233da4c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:ced6dbca20663462d35a97ca21836503e9987f29d37896ce8c5fb89650268762_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:e374c0aad61fb4a2af3dd0e8310286e45e283dac47c8e766f34cabf1d8cc2563_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:27f2b11d9017cad3af4f872ce382b54492bae329c499f4423c6ef7342522f844_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:371f8ec4475c9af90dbaf1a76a6b1217e195d3c371b0903137df92e8733371db_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:568aee9b50f1b79b0d3edea5e5a4f877ad8fcfe6f3e81e6f3cf049774dfe4bc9_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:e20f2aa3083e6d4100b4a38df9b416ac8b0f6a475fffff9754437fe4697dbd94_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:7d16492d3d30bb614c6155b2a3de1a3cfcd55100c06078c96557831f9c19221c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:85f7963a86254181a79cd48a98130c4b0cd50abe6d704940dac5958ab9d11863_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:89a50676a19cc0187665f7c06ddd717a37df80c4b0eccb96447380b7ba2db663_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:e6d522327993a91ed50b12745b26db70b5f7b374bb015ef7165ef7c3b59529b4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:1052d9b0befb2fd315b445ed4ccca0490075fa82d2752f1507f3daba6476d87a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:5511144641603a3fc4c93ae9d7253ba2fccc55f8806913a4e08ec9f3b919d5c8_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:b8e2d11f40a5a29f0a3fc870dafd8ce6c72e8983f44d5084814b0cc56d410fe7_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:fd3eb25ba4e8baaf13bdebf9a5c70d20d79a642bccd808c8dfbec52b403a2608_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:47265159cef044b5a4086af6506b3ad570d0966d80a5dd0c69d391ced37e2572_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:a6dc13baffa1382bc1316588eba2e63cfc1630d059b3b9ab53dd53c98d135220_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d69051165ba4538e28097a2caa510ae3bab59223e473eb9286763a0c8e2137d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:e04fa41cee83d89a88fc68bc38aadaa69f9c9f30e9a95f19eba299647e5f99bc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:1e8efca30bc8130a20834ee0dfeff80a62c4b129c2f849492a62f761a684d105_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:572430d7b231e93613667d049f11ad8c0570f9cda09b1a0d9c9367a31ada8d86_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:736ac64d54c2a12dc2234272862e5a52c283dca3273ed2c95cb73167bdc177fa_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:9c3a0cae8f0998134af791cf690fe6a42783f6caed795c62d67c57ebd849d983_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:2ad0563c640566cc6e55ae741b09cd353cdd8a343931596ed1ce93d49e076667_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:ba5349debff221eb5e47fac02f60c5d664a32b5cf53a654e3e983ef036acb263_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:cd373cc3574546fc2e48a58a3a7e90620494ccb24507337ef1d9a90aaf88d02d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:e448d52eede5096fdb44b6850905a71959e2f90db6fea1cdd17cca941959a9d8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:1136c984617f2a3c71a5b451c5de88f06245a9a9c83783c16a6938b6f7272f80_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:b7b9c35577b5a91539597fa90c6187e20cdbad70e8ddc55c8dc80058759be711_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:bdf691c5300034b0331daea8d92f942c3db66aa11fd726d977ae36fec1791695_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:cc46200f1bd3aa621f80fc5535c917318d50084eea265b22fe1b79871184d7bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:2d1bb2935a4c90bf9ca6b22a11a07fcaba002f2020d0ea15b82a7cf4df66713c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:5d1e7ef39de25f974949e49cbe325783e78071678e30bc3d2311710875dba2bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:8b7aa7f81955082085fbf1317ad5d747f4e19ce35c13f17c8f57eb810a1adbf7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:dc0ffee2f8c96c6ee22a2ddb06d14e08149561bab7b4195d08b59f628870af68_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4489ffd456a5d5704dccafc45b523f572f90307e57b8b353f8d8ce4c42706d4f_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4b6d6e9d9146d9834fb999ee2cbec8c56806d09bce1137bd3869fa125d064f10_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:93147af5126f419ac3fe2a0c95715b76299f27ff642483b2d14b89301367d056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:fea7a807792063cafdd6196fc68e8f7b693d7f123241c6bd64f4a00050f4a5ef_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:2eb424b36226bec87b5277eea7f5ff288409a49f99c3f60ab795bf39a07af7c1_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4974b49892263b43d379077d1d44ebf579e4da3700043a9c370e52359d852e7b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4cafcf98bfde7d9700ea55ef88c183fbf172da5d1bbc57c315df4f0d00591547_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:6f3a3fcf20935e6454baf90004604407c0e205b78d5accc10aefdb03fde0faf6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:3ec58884225aa63c85639cda97c4d7c57c7ca505c885e9a5bcbbe14bd6fc82c6_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:62fb9dd8ffc2b61de085d39ba2fb0a8192c3634a79b6cf4d9821fdc95efc1fe4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:cfb71cbaeaa7cfa8280e19f89132a8ba8fc2ea84dfb6654975c1176ee1cfac4c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:d23b6e3b510f387235b042dd3e658caab3a3af7386895a53f0967fd8bca77f80_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:2d2159059467f0f9f4eb6550d6fe1739193101d784a3098fce4f25b37f3753a7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:8839a8851cea3d34dd15274678b6f00a80394308197a877be5505f4af39b62cc_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:9133c95a0fefcec77396b1ec04b33024a0e1a3716658de9debeb92a5ffc47f31_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:c8bde9c9afc34300b7193a8b9ad1c103efd8945b350ab007d9ca6d515ac9c007_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:05094b109396ae9f2a5f346602051a7310000d08890540d1fdef3712455f51c0_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b00b82b23fbabbf3dceaca70c0bb583405ef105cbd21037dd992c2461368bd2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b222fa278dcff0824bc0340e27b6182ffc04506e54d99048f5c01c6bc604ad7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:cc032f7a173f50c51872ddbf9a9c17fa51b7fd91cb3e7b8aeba378c2725043de_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:244bd3fa3c960a9eee6d978fe9291d7b112daf2f5516840292fd0298acee5ac1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:aba46c2c0e3ab613120a479c75f9dde8c772e7ec24034886371665c5c6b2fa8d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:bb19a56cdf094216cc7a4398ce76d0e53081a6a1ce6a05af5951ac3099af84e0_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:f9c0e9e31a1aeddfefb4f24f7dd70971c1e32d6c4ac99745f81ea63afb526823_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:bcf5e63aba5e78b6a41dadcf73b70dc9940380c232cc2931b5da3ddfe2ecf8fc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:cc10845b259f7ac1cae5b254e090d52fb9278c89d07b0b7d44a8f6f704ec6272_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:de69593578d899842a0e98781f9c3d58338ee0925fa0b6243aedbb569a64cd96_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:e4e7e0b3fc069d4746f6584047f8b40cd774b2556f11c2cabb57923a44ef389d_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:10981e0c7a156dbfd3b8cec809c618773f3d7806a2a24c0fb1cda2e93ed6ae98_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:31f187246ac7da245c160b3afc5f1187d82cd2c039f85111a338165407d7d49d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:a498c21c46341a168e51b133e07cd390d7440c3d949ac4107cd829c5b30a4614_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:fd7b341a1e55aec25f6e3221f03d140561be81a230590907dd74fe1a021df006_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:0180391fe4bca530eb5678bf95922d10365b286279b966136b67bf8d83a9a18c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:4ea287235d5dbf2385f4d217690b54cd5ce56820735ae96d66ea03d86d4426c3_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:6eec1cff0d514e343599e9c3ca7b7aa2cbff307a28e45b19364a534be4f89dd1_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:e9d1e97601e8eaea73943489e782482703310d2e8f22a9fa234b640fcacbe64b_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:7b5496adbf0b53964790dbb22c468161e6d873912eacd00b08b955c1314d52a8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:8d86d2d4ac2459d61a1e493603c9eb7a3f0d584ad53aca2af884bf8bb8b30e71_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:c39a384c11e5242dc4b25fdd32813b4ff408b188af76df03e9757796fbc7a001_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:e0137ca5fd87bc47473fc0fc4c619ea794fac6156d84f7f4fbc689fe3328640e_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:01a0a5b524624b960339e6d40bc92eaf666532b7905b8b79a31a0ad512336f20_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:4285f5036dcf7311bc378bbe350dc33759254999de205929de90a9d218d32f78_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:b2f27f77bcbb85c3a57d40c14928a3922877270f4748cb2d03abfc4300f1925c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:e5ca54ae610b6fdd062b22d68e04e8c9638a4afe9df3dee7316a09a4a50f929d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:8f10940b7e9f69bb5f5bb40fb4575f24fc8a2f20916615d6af4eff36b0dc24b2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9e4527837150c9054e9f5eb594d557fb4642b86f1dfd109897ea63b5ff5984dd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:adfeb1a43a5b626519d6c0aee7cd7986d5afd349a4fae37d0e8821667f7fc6d3_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:d9fecb5eebf1127819cf7a3f2c2b63e050cab8864c51d4dbcad4d95921a9b698_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:0bf1c2e7d2204076757c8bbb922e11feacedcefff491bfabf481d4c27f310448_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:437680b6193c0cf77c28cb2124e01a33b7dd51063366c5781aeaf339a840b056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:cc587469525f61858f261cfbf862608aab1509bf3cf5c1e43aea63a19e579728_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:e7dc46d30ae833d7924260391781b20ffc25693073e1a4b60266caa6bd725f90_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:0712ee64942be9d307a5d89d5333a968092a685fa71c88c7eabe1498e2e3a915_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2358f82cbcf6406c86a1ec0f9ccf649dfea143797cd7d112be21c6adfdbf87_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:58d58f838d9fc2ed84635083a00725a47334ee03b8a4282000b69dedddd7a9bd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:a6950372d2ab44e865938a37f5c2dfdd55bf02cec1575353538dd28b016700f4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:2fdf436e71fee6739ae6fcd450007d76fc3fa43ba203a809f3337f22d9229bd5_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:60751156b9a51d18668dee969963569a998172b0577acaeaecff52970f3c0957_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:a86aa371b54e25d0b38ae06aea67577142b227bea31597493639ec0018391a4b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:d0955c18fa4864e073bfb9a61b42261587fc2f5f1b2f29cd0b139be5373b578a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:5e2316240808f561c9ec5b04a57e41776b7efc9a26afa9ae10f7bf7693b30d97_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:63be8363c2915b782cd9fc6007b761bc6d3ac9f77bfc35fae1c55c00974058f7_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:84d99fc9411e1a8d409d8c6bcd345cfdfee5c5986d6489a2633ffc7d4ad496b4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:a3f0cde47e922823ca537e0de8c7ddfed7422be5282e137e4db04d4e3c748104_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:2acf15b73b6db09469d53c6317088fc5f633f684f8421cc4a09f52d1056a2bb6_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a53abad37395ec507071b894e51a0086b063a1d1d27e4d029b2d3cfb51bc0d14_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a9871b54bfa689489d578155adb5a483cab73e202c092619e116e71efb476c00_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:bf6e25c9b7d66fb0c45c0ebdbbd0ee34b7a9e1cff1ac70128ee7e475812bfa7c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:4955d00cb76f1360a80679973e9d53fcf38a57e0220bc8a29728cd0360327972_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:684094906425b67784bb7f10a152cd15e354bd84a2a2d68178000122bd43794d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:8794c45c047ad41c71fbd788d35d493a9e4f78c947106391b0f67d3d572b2d06_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:d0dbcb780c8782e3b1d6abda17255bc45ec4fb5d01e29e8cb3b91bfa0a46c55a_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:0a49a64e48aed198f1ead92cd6584bd8b62813dc2621489783b9a62469d7f9e6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:2c17ef74e6ec8ae3a02268e43d9018eefaafc4493f94de3a8ca6a6fc836be6a4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:40a5278bcc8e647aaf16ccca432c4d9bec67ec074569f192420bca529fdaf113_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:eafd28f0dd525e4c11b90d01e686ada9bb6ef9e9097e81608df8c04ed15d513b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:0f47ceec837a12497ee911279b0fba82481e72ee163670a8674630f948d39aba_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:32166ec828cbc58224e236a86bd7439464379272f473bcdcd2ec765f7081a5b7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:65c8b3770f82794d55d269a004948a8e2c54cbd99b09552b4cdb91475baee5a2_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:a3c91540f20f094fee24224bce21018aa671849e7f75aece1bddfb6c945289d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:0b03429102eea10cc0733872bbc946bbfa378966b5d62e32762bd7a59c23e9de_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:44e5c0c8674682d03d564fef5e9f668d4ab71e6f27a64ee1bd7a2cf0c47d0db1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:8422d2c6e47dbb14bc80b03734fd702c57724bf384557e9b9e1a67b85e6b8185_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:b95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:661171f5a869f110ada60973b2c8289d80df4e7e7373e13bdb68bd5f59be91ea_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:9c1f70be52ba4c49de28376802bf2d73fe0a3bc44282ace7606cfb123233da4c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:ced6dbca20663462d35a97ca21836503e9987f29d37896ce8c5fb89650268762_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:e374c0aad61fb4a2af3dd0e8310286e45e283dac47c8e766f34cabf1d8cc2563_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:27f2b11d9017cad3af4f872ce382b54492bae329c499f4423c6ef7342522f844_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:371f8ec4475c9af90dbaf1a76a6b1217e195d3c371b0903137df92e8733371db_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:568aee9b50f1b79b0d3edea5e5a4f877ad8fcfe6f3e81e6f3cf049774dfe4bc9_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:e20f2aa3083e6d4100b4a38df9b416ac8b0f6a475fffff9754437fe4697dbd94_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:7d16492d3d30bb614c6155b2a3de1a3cfcd55100c06078c96557831f9c19221c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:85f7963a86254181a79cd48a98130c4b0cd50abe6d704940dac5958ab9d11863_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:89a50676a19cc0187665f7c06ddd717a37df80c4b0eccb96447380b7ba2db663_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:e6d522327993a91ed50b12745b26db70b5f7b374bb015ef7165ef7c3b59529b4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:1052d9b0befb2fd315b445ed4ccca0490075fa82d2752f1507f3daba6476d87a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:5511144641603a3fc4c93ae9d7253ba2fccc55f8806913a4e08ec9f3b919d5c8_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:b8e2d11f40a5a29f0a3fc870dafd8ce6c72e8983f44d5084814b0cc56d410fe7_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:fd3eb25ba4e8baaf13bdebf9a5c70d20d79a642bccd808c8dfbec52b403a2608_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:47265159cef044b5a4086af6506b3ad570d0966d80a5dd0c69d391ced37e2572_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:a6dc13baffa1382bc1316588eba2e63cfc1630d059b3b9ab53dd53c98d135220_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d69051165ba4538e28097a2caa510ae3bab59223e473eb9286763a0c8e2137d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:e04fa41cee83d89a88fc68bc38aadaa69f9c9f30e9a95f19eba299647e5f99bc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:1e8efca30bc8130a20834ee0dfeff80a62c4b129c2f849492a62f761a684d105_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:572430d7b231e93613667d049f11ad8c0570f9cda09b1a0d9c9367a31ada8d86_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:736ac64d54c2a12dc2234272862e5a52c283dca3273ed2c95cb73167bdc177fa_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:9c3a0cae8f0998134af791cf690fe6a42783f6caed795c62d67c57ebd849d983_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:2ad0563c640566cc6e55ae741b09cd353cdd8a343931596ed1ce93d49e076667_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:ba5349debff221eb5e47fac02f60c5d664a32b5cf53a654e3e983ef036acb263_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:cd373cc3574546fc2e48a58a3a7e90620494ccb24507337ef1d9a90aaf88d02d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:e448d52eede5096fdb44b6850905a71959e2f90db6fea1cdd17cca941959a9d8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:1136c984617f2a3c71a5b451c5de88f06245a9a9c83783c16a6938b6f7272f80_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:b7b9c35577b5a91539597fa90c6187e20cdbad70e8ddc55c8dc80058759be711_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:bdf691c5300034b0331daea8d92f942c3db66aa11fd726d977ae36fec1791695_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:cc46200f1bd3aa621f80fc5535c917318d50084eea265b22fe1b79871184d7bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:2d1bb2935a4c90bf9ca6b22a11a07fcaba002f2020d0ea15b82a7cf4df66713c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:5d1e7ef39de25f974949e49cbe325783e78071678e30bc3d2311710875dba2bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:8b7aa7f81955082085fbf1317ad5d747f4e19ce35c13f17c8f57eb810a1adbf7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:dc0ffee2f8c96c6ee22a2ddb06d14e08149561bab7b4195d08b59f628870af68_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4489ffd456a5d5704dccafc45b523f572f90307e57b8b353f8d8ce4c42706d4f_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4b6d6e9d9146d9834fb999ee2cbec8c56806d09bce1137bd3869fa125d064f10_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:93147af5126f419ac3fe2a0c95715b76299f27ff642483b2d14b89301367d056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:fea7a807792063cafdd6196fc68e8f7b693d7f123241c6bd64f4a00050f4a5ef_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:2eb424b36226bec87b5277eea7f5ff288409a49f99c3f60ab795bf39a07af7c1_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4974b49892263b43d379077d1d44ebf579e4da3700043a9c370e52359d852e7b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4cafcf98bfde7d9700ea55ef88c183fbf172da5d1bbc57c315df4f0d00591547_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:6f3a3fcf20935e6454baf90004604407c0e205b78d5accc10aefdb03fde0faf6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:3ec58884225aa63c85639cda97c4d7c57c7ca505c885e9a5bcbbe14bd6fc82c6_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:62fb9dd8ffc2b61de085d39ba2fb0a8192c3634a79b6cf4d9821fdc95efc1fe4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:cfb71cbaeaa7cfa8280e19f89132a8ba8fc2ea84dfb6654975c1176ee1cfac4c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:d23b6e3b510f387235b042dd3e658caab3a3af7386895a53f0967fd8bca77f80_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:2d2159059467f0f9f4eb6550d6fe1739193101d784a3098fce4f25b37f3753a7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:8839a8851cea3d34dd15274678b6f00a80394308197a877be5505f4af39b62cc_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:9133c95a0fefcec77396b1ec04b33024a0e1a3716658de9debeb92a5ffc47f31_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:c8bde9c9afc34300b7193a8b9ad1c103efd8945b350ab007d9ca6d515ac9c007_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:05094b109396ae9f2a5f346602051a7310000d08890540d1fdef3712455f51c0_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b00b82b23fbabbf3dceaca70c0bb583405ef105cbd21037dd992c2461368bd2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b222fa278dcff0824bc0340e27b6182ffc04506e54d99048f5c01c6bc604ad7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:cc032f7a173f50c51872ddbf9a9c17fa51b7fd91cb3e7b8aeba378c2725043de_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:244bd3fa3c960a9eee6d978fe9291d7b112daf2f5516840292fd0298acee5ac1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:aba46c2c0e3ab613120a479c75f9dde8c772e7ec24034886371665c5c6b2fa8d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:bb19a56cdf094216cc7a4398ce76d0e53081a6a1ce6a05af5951ac3099af84e0_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:f9c0e9e31a1aeddfefb4f24f7dd70971c1e32d6c4ac99745f81ea63afb526823_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map"
},
{
"cve": "CVE-2025-58190",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2026-02-05T18:01:26.511908+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:bcf5e63aba5e78b6a41dadcf73b70dc9940380c232cc2931b5da3ddfe2ecf8fc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:cc10845b259f7ac1cae5b254e090d52fb9278c89d07b0b7d44a8f6f704ec6272_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:de69593578d899842a0e98781f9c3d58338ee0925fa0b6243aedbb569a64cd96_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:e4e7e0b3fc069d4746f6584047f8b40cd774b2556f11c2cabb57923a44ef389d_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:10981e0c7a156dbfd3b8cec809c618773f3d7806a2a24c0fb1cda2e93ed6ae98_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:31f187246ac7da245c160b3afc5f1187d82cd2c039f85111a338165407d7d49d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:a498c21c46341a168e51b133e07cd390d7440c3d949ac4107cd829c5b30a4614_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:fd7b341a1e55aec25f6e3221f03d140561be81a230590907dd74fe1a021df006_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:0180391fe4bca530eb5678bf95922d10365b286279b966136b67bf8d83a9a18c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:4ea287235d5dbf2385f4d217690b54cd5ce56820735ae96d66ea03d86d4426c3_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:6eec1cff0d514e343599e9c3ca7b7aa2cbff307a28e45b19364a534be4f89dd1_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:e9d1e97601e8eaea73943489e782482703310d2e8f22a9fa234b640fcacbe64b_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:7b5496adbf0b53964790dbb22c468161e6d873912eacd00b08b955c1314d52a8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:8d86d2d4ac2459d61a1e493603c9eb7a3f0d584ad53aca2af884bf8bb8b30e71_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:c39a384c11e5242dc4b25fdd32813b4ff408b188af76df03e9757796fbc7a001_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:e0137ca5fd87bc47473fc0fc4c619ea794fac6156d84f7f4fbc689fe3328640e_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:01a0a5b524624b960339e6d40bc92eaf666532b7905b8b79a31a0ad512336f20_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:4285f5036dcf7311bc378bbe350dc33759254999de205929de90a9d218d32f78_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:b2f27f77bcbb85c3a57d40c14928a3922877270f4748cb2d03abfc4300f1925c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:e5ca54ae610b6fdd062b22d68e04e8c9638a4afe9df3dee7316a09a4a50f929d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:8f10940b7e9f69bb5f5bb40fb4575f24fc8a2f20916615d6af4eff36b0dc24b2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9e4527837150c9054e9f5eb594d557fb4642b86f1dfd109897ea63b5ff5984dd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:adfeb1a43a5b626519d6c0aee7cd7986d5afd349a4fae37d0e8821667f7fc6d3_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:d9fecb5eebf1127819cf7a3f2c2b63e050cab8864c51d4dbcad4d95921a9b698_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:0bf1c2e7d2204076757c8bbb922e11feacedcefff491bfabf481d4c27f310448_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:437680b6193c0cf77c28cb2124e01a33b7dd51063366c5781aeaf339a840b056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:cc587469525f61858f261cfbf862608aab1509bf3cf5c1e43aea63a19e579728_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:e7dc46d30ae833d7924260391781b20ffc25693073e1a4b60266caa6bd725f90_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:0712ee64942be9d307a5d89d5333a968092a685fa71c88c7eabe1498e2e3a915_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2358f82cbcf6406c86a1ec0f9ccf649dfea143797cd7d112be21c6adfdbf87_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:58d58f838d9fc2ed84635083a00725a47334ee03b8a4282000b69dedddd7a9bd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:a6950372d2ab44e865938a37f5c2dfdd55bf02cec1575353538dd28b016700f4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:2fdf436e71fee6739ae6fcd450007d76fc3fa43ba203a809f3337f22d9229bd5_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:60751156b9a51d18668dee969963569a998172b0577acaeaecff52970f3c0957_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:a86aa371b54e25d0b38ae06aea67577142b227bea31597493639ec0018391a4b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:d0955c18fa4864e073bfb9a61b42261587fc2f5f1b2f29cd0b139be5373b578a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:5e2316240808f561c9ec5b04a57e41776b7efc9a26afa9ae10f7bf7693b30d97_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:63be8363c2915b782cd9fc6007b761bc6d3ac9f77bfc35fae1c55c00974058f7_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:84d99fc9411e1a8d409d8c6bcd345cfdfee5c5986d6489a2633ffc7d4ad496b4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:a3f0cde47e922823ca537e0de8c7ddfed7422be5282e137e4db04d4e3c748104_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:2acf15b73b6db09469d53c6317088fc5f633f684f8421cc4a09f52d1056a2bb6_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a53abad37395ec507071b894e51a0086b063a1d1d27e4d029b2d3cfb51bc0d14_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a9871b54bfa689489d578155adb5a483cab73e202c092619e116e71efb476c00_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:bf6e25c9b7d66fb0c45c0ebdbbd0ee34b7a9e1cff1ac70128ee7e475812bfa7c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:4955d00cb76f1360a80679973e9d53fcf38a57e0220bc8a29728cd0360327972_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:684094906425b67784bb7f10a152cd15e354bd84a2a2d68178000122bd43794d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:8794c45c047ad41c71fbd788d35d493a9e4f78c947106391b0f67d3d572b2d06_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:d0dbcb780c8782e3b1d6abda17255bc45ec4fb5d01e29e8cb3b91bfa0a46c55a_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:0a49a64e48aed198f1ead92cd6584bd8b62813dc2621489783b9a62469d7f9e6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:2c17ef74e6ec8ae3a02268e43d9018eefaafc4493f94de3a8ca6a6fc836be6a4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:40a5278bcc8e647aaf16ccca432c4d9bec67ec074569f192420bca529fdaf113_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:eafd28f0dd525e4c11b90d01e686ada9bb6ef9e9097e81608df8c04ed15d513b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:0f47ceec837a12497ee911279b0fba82481e72ee163670a8674630f948d39aba_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:32166ec828cbc58224e236a86bd7439464379272f473bcdcd2ec765f7081a5b7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:65c8b3770f82794d55d269a004948a8e2c54cbd99b09552b4cdb91475baee5a2_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:a3c91540f20f094fee24224bce21018aa671849e7f75aece1bddfb6c945289d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:661171f5a869f110ada60973b2c8289d80df4e7e7373e13bdb68bd5f59be91ea_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:9c1f70be52ba4c49de28376802bf2d73fe0a3bc44282ace7606cfb123233da4c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:ced6dbca20663462d35a97ca21836503e9987f29d37896ce8c5fb89650268762_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:e374c0aad61fb4a2af3dd0e8310286e45e283dac47c8e766f34cabf1d8cc2563_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:27f2b11d9017cad3af4f872ce382b54492bae329c499f4423c6ef7342522f844_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:371f8ec4475c9af90dbaf1a76a6b1217e195d3c371b0903137df92e8733371db_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:568aee9b50f1b79b0d3edea5e5a4f877ad8fcfe6f3e81e6f3cf049774dfe4bc9_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:e20f2aa3083e6d4100b4a38df9b416ac8b0f6a475fffff9754437fe4697dbd94_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:7d16492d3d30bb614c6155b2a3de1a3cfcd55100c06078c96557831f9c19221c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:85f7963a86254181a79cd48a98130c4b0cd50abe6d704940dac5958ab9d11863_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:89a50676a19cc0187665f7c06ddd717a37df80c4b0eccb96447380b7ba2db663_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:e6d522327993a91ed50b12745b26db70b5f7b374bb015ef7165ef7c3b59529b4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:1052d9b0befb2fd315b445ed4ccca0490075fa82d2752f1507f3daba6476d87a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:5511144641603a3fc4c93ae9d7253ba2fccc55f8806913a4e08ec9f3b919d5c8_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:b8e2d11f40a5a29f0a3fc870dafd8ce6c72e8983f44d5084814b0cc56d410fe7_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:fd3eb25ba4e8baaf13bdebf9a5c70d20d79a642bccd808c8dfbec52b403a2608_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:47265159cef044b5a4086af6506b3ad570d0966d80a5dd0c69d391ced37e2572_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:a6dc13baffa1382bc1316588eba2e63cfc1630d059b3b9ab53dd53c98d135220_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d69051165ba4538e28097a2caa510ae3bab59223e473eb9286763a0c8e2137d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:e04fa41cee83d89a88fc68bc38aadaa69f9c9f30e9a95f19eba299647e5f99bc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:1e8efca30bc8130a20834ee0dfeff80a62c4b129c2f849492a62f761a684d105_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:572430d7b231e93613667d049f11ad8c0570f9cda09b1a0d9c9367a31ada8d86_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:736ac64d54c2a12dc2234272862e5a52c283dca3273ed2c95cb73167bdc177fa_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:9c3a0cae8f0998134af791cf690fe6a42783f6caed795c62d67c57ebd849d983_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:2ad0563c640566cc6e55ae741b09cd353cdd8a343931596ed1ce93d49e076667_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:ba5349debff221eb5e47fac02f60c5d664a32b5cf53a654e3e983ef036acb263_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:cd373cc3574546fc2e48a58a3a7e90620494ccb24507337ef1d9a90aaf88d02d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:e448d52eede5096fdb44b6850905a71959e2f90db6fea1cdd17cca941959a9d8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:1136c984617f2a3c71a5b451c5de88f06245a9a9c83783c16a6938b6f7272f80_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:b7b9c35577b5a91539597fa90c6187e20cdbad70e8ddc55c8dc80058759be711_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:bdf691c5300034b0331daea8d92f942c3db66aa11fd726d977ae36fec1791695_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:cc46200f1bd3aa621f80fc5535c917318d50084eea265b22fe1b79871184d7bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:2d1bb2935a4c90bf9ca6b22a11a07fcaba002f2020d0ea15b82a7cf4df66713c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:5d1e7ef39de25f974949e49cbe325783e78071678e30bc3d2311710875dba2bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:8b7aa7f81955082085fbf1317ad5d747f4e19ce35c13f17c8f57eb810a1adbf7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:dc0ffee2f8c96c6ee22a2ddb06d14e08149561bab7b4195d08b59f628870af68_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4489ffd456a5d5704dccafc45b523f572f90307e57b8b353f8d8ce4c42706d4f_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4b6d6e9d9146d9834fb999ee2cbec8c56806d09bce1137bd3869fa125d064f10_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:93147af5126f419ac3fe2a0c95715b76299f27ff642483b2d14b89301367d056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:fea7a807792063cafdd6196fc68e8f7b693d7f123241c6bd64f4a00050f4a5ef_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:2eb424b36226bec87b5277eea7f5ff288409a49f99c3f60ab795bf39a07af7c1_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4974b49892263b43d379077d1d44ebf579e4da3700043a9c370e52359d852e7b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4cafcf98bfde7d9700ea55ef88c183fbf172da5d1bbc57c315df4f0d00591547_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:6f3a3fcf20935e6454baf90004604407c0e205b78d5accc10aefdb03fde0faf6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:3ec58884225aa63c85639cda97c4d7c57c7ca505c885e9a5bcbbe14bd6fc82c6_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:62fb9dd8ffc2b61de085d39ba2fb0a8192c3634a79b6cf4d9821fdc95efc1fe4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:cfb71cbaeaa7cfa8280e19f89132a8ba8fc2ea84dfb6654975c1176ee1cfac4c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:d23b6e3b510f387235b042dd3e658caab3a3af7386895a53f0967fd8bca77f80_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:2d2159059467f0f9f4eb6550d6fe1739193101d784a3098fce4f25b37f3753a7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:8839a8851cea3d34dd15274678b6f00a80394308197a877be5505f4af39b62cc_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:9133c95a0fefcec77396b1ec04b33024a0e1a3716658de9debeb92a5ffc47f31_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:c8bde9c9afc34300b7193a8b9ad1c103efd8945b350ab007d9ca6d515ac9c007_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:05094b109396ae9f2a5f346602051a7310000d08890540d1fdef3712455f51c0_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b00b82b23fbabbf3dceaca70c0bb583405ef105cbd21037dd992c2461368bd2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b222fa278dcff0824bc0340e27b6182ffc04506e54d99048f5c01c6bc604ad7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:cc032f7a173f50c51872ddbf9a9c17fa51b7fd91cb3e7b8aeba378c2725043de_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:244bd3fa3c960a9eee6d978fe9291d7b112daf2f5516840292fd0298acee5ac1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:aba46c2c0e3ab613120a479c75f9dde8c772e7ec24034886371665c5c6b2fa8d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:bb19a56cdf094216cc7a4398ce76d0e53081a6a1ce6a05af5951ac3099af84e0_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:f9c0e9e31a1aeddfefb4f24f7dd70971c1e32d6c4ac99745f81ea63afb526823_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437110"
}
],
"notes": [
{
"category": "description",
"text": "The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/net/html: Infinite parsing loop in golang.org/x/net",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:0b03429102eea10cc0733872bbc946bbfa378966b5d62e32762bd7a59c23e9de_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:44e5c0c8674682d03d564fef5e9f668d4ab71e6f27a64ee1bd7a2cf0c47d0db1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:8422d2c6e47dbb14bc80b03734fd702c57724bf384557e9b9e1a67b85e6b8185_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:b95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb_amd64"
],
"known_not_affected": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:bcf5e63aba5e78b6a41dadcf73b70dc9940380c232cc2931b5da3ddfe2ecf8fc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:cc10845b259f7ac1cae5b254e090d52fb9278c89d07b0b7d44a8f6f704ec6272_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:de69593578d899842a0e98781f9c3d58338ee0925fa0b6243aedbb569a64cd96_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:e4e7e0b3fc069d4746f6584047f8b40cd774b2556f11c2cabb57923a44ef389d_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:10981e0c7a156dbfd3b8cec809c618773f3d7806a2a24c0fb1cda2e93ed6ae98_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:31f187246ac7da245c160b3afc5f1187d82cd2c039f85111a338165407d7d49d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:a498c21c46341a168e51b133e07cd390d7440c3d949ac4107cd829c5b30a4614_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:fd7b341a1e55aec25f6e3221f03d140561be81a230590907dd74fe1a021df006_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:0180391fe4bca530eb5678bf95922d10365b286279b966136b67bf8d83a9a18c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:4ea287235d5dbf2385f4d217690b54cd5ce56820735ae96d66ea03d86d4426c3_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:6eec1cff0d514e343599e9c3ca7b7aa2cbff307a28e45b19364a534be4f89dd1_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:e9d1e97601e8eaea73943489e782482703310d2e8f22a9fa234b640fcacbe64b_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:7b5496adbf0b53964790dbb22c468161e6d873912eacd00b08b955c1314d52a8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:8d86d2d4ac2459d61a1e493603c9eb7a3f0d584ad53aca2af884bf8bb8b30e71_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:c39a384c11e5242dc4b25fdd32813b4ff408b188af76df03e9757796fbc7a001_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:e0137ca5fd87bc47473fc0fc4c619ea794fac6156d84f7f4fbc689fe3328640e_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:01a0a5b524624b960339e6d40bc92eaf666532b7905b8b79a31a0ad512336f20_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:4285f5036dcf7311bc378bbe350dc33759254999de205929de90a9d218d32f78_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:b2f27f77bcbb85c3a57d40c14928a3922877270f4748cb2d03abfc4300f1925c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:e5ca54ae610b6fdd062b22d68e04e8c9638a4afe9df3dee7316a09a4a50f929d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:8f10940b7e9f69bb5f5bb40fb4575f24fc8a2f20916615d6af4eff36b0dc24b2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9e4527837150c9054e9f5eb594d557fb4642b86f1dfd109897ea63b5ff5984dd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:adfeb1a43a5b626519d6c0aee7cd7986d5afd349a4fae37d0e8821667f7fc6d3_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:d9fecb5eebf1127819cf7a3f2c2b63e050cab8864c51d4dbcad4d95921a9b698_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:0bf1c2e7d2204076757c8bbb922e11feacedcefff491bfabf481d4c27f310448_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:437680b6193c0cf77c28cb2124e01a33b7dd51063366c5781aeaf339a840b056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:cc587469525f61858f261cfbf862608aab1509bf3cf5c1e43aea63a19e579728_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:e7dc46d30ae833d7924260391781b20ffc25693073e1a4b60266caa6bd725f90_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:0712ee64942be9d307a5d89d5333a968092a685fa71c88c7eabe1498e2e3a915_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2358f82cbcf6406c86a1ec0f9ccf649dfea143797cd7d112be21c6adfdbf87_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:58d58f838d9fc2ed84635083a00725a47334ee03b8a4282000b69dedddd7a9bd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:a6950372d2ab44e865938a37f5c2dfdd55bf02cec1575353538dd28b016700f4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:2fdf436e71fee6739ae6fcd450007d76fc3fa43ba203a809f3337f22d9229bd5_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:60751156b9a51d18668dee969963569a998172b0577acaeaecff52970f3c0957_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:a86aa371b54e25d0b38ae06aea67577142b227bea31597493639ec0018391a4b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:d0955c18fa4864e073bfb9a61b42261587fc2f5f1b2f29cd0b139be5373b578a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:5e2316240808f561c9ec5b04a57e41776b7efc9a26afa9ae10f7bf7693b30d97_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:63be8363c2915b782cd9fc6007b761bc6d3ac9f77bfc35fae1c55c00974058f7_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:84d99fc9411e1a8d409d8c6bcd345cfdfee5c5986d6489a2633ffc7d4ad496b4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:a3f0cde47e922823ca537e0de8c7ddfed7422be5282e137e4db04d4e3c748104_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:2acf15b73b6db09469d53c6317088fc5f633f684f8421cc4a09f52d1056a2bb6_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a53abad37395ec507071b894e51a0086b063a1d1d27e4d029b2d3cfb51bc0d14_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a9871b54bfa689489d578155adb5a483cab73e202c092619e116e71efb476c00_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:bf6e25c9b7d66fb0c45c0ebdbbd0ee34b7a9e1cff1ac70128ee7e475812bfa7c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:4955d00cb76f1360a80679973e9d53fcf38a57e0220bc8a29728cd0360327972_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:684094906425b67784bb7f10a152cd15e354bd84a2a2d68178000122bd43794d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:8794c45c047ad41c71fbd788d35d493a9e4f78c947106391b0f67d3d572b2d06_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:d0dbcb780c8782e3b1d6abda17255bc45ec4fb5d01e29e8cb3b91bfa0a46c55a_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:0a49a64e48aed198f1ead92cd6584bd8b62813dc2621489783b9a62469d7f9e6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:2c17ef74e6ec8ae3a02268e43d9018eefaafc4493f94de3a8ca6a6fc836be6a4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:40a5278bcc8e647aaf16ccca432c4d9bec67ec074569f192420bca529fdaf113_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:eafd28f0dd525e4c11b90d01e686ada9bb6ef9e9097e81608df8c04ed15d513b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:0f47ceec837a12497ee911279b0fba82481e72ee163670a8674630f948d39aba_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:32166ec828cbc58224e236a86bd7439464379272f473bcdcd2ec765f7081a5b7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:65c8b3770f82794d55d269a004948a8e2c54cbd99b09552b4cdb91475baee5a2_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:a3c91540f20f094fee24224bce21018aa671849e7f75aece1bddfb6c945289d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:661171f5a869f110ada60973b2c8289d80df4e7e7373e13bdb68bd5f59be91ea_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:9c1f70be52ba4c49de28376802bf2d73fe0a3bc44282ace7606cfb123233da4c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:ced6dbca20663462d35a97ca21836503e9987f29d37896ce8c5fb89650268762_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:e374c0aad61fb4a2af3dd0e8310286e45e283dac47c8e766f34cabf1d8cc2563_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:27f2b11d9017cad3af4f872ce382b54492bae329c499f4423c6ef7342522f844_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:371f8ec4475c9af90dbaf1a76a6b1217e195d3c371b0903137df92e8733371db_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:568aee9b50f1b79b0d3edea5e5a4f877ad8fcfe6f3e81e6f3cf049774dfe4bc9_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:e20f2aa3083e6d4100b4a38df9b416ac8b0f6a475fffff9754437fe4697dbd94_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:7d16492d3d30bb614c6155b2a3de1a3cfcd55100c06078c96557831f9c19221c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:85f7963a86254181a79cd48a98130c4b0cd50abe6d704940dac5958ab9d11863_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:89a50676a19cc0187665f7c06ddd717a37df80c4b0eccb96447380b7ba2db663_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:e6d522327993a91ed50b12745b26db70b5f7b374bb015ef7165ef7c3b59529b4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:1052d9b0befb2fd315b445ed4ccca0490075fa82d2752f1507f3daba6476d87a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:5511144641603a3fc4c93ae9d7253ba2fccc55f8806913a4e08ec9f3b919d5c8_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:b8e2d11f40a5a29f0a3fc870dafd8ce6c72e8983f44d5084814b0cc56d410fe7_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:fd3eb25ba4e8baaf13bdebf9a5c70d20d79a642bccd808c8dfbec52b403a2608_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:47265159cef044b5a4086af6506b3ad570d0966d80a5dd0c69d391ced37e2572_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:a6dc13baffa1382bc1316588eba2e63cfc1630d059b3b9ab53dd53c98d135220_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d69051165ba4538e28097a2caa510ae3bab59223e473eb9286763a0c8e2137d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:e04fa41cee83d89a88fc68bc38aadaa69f9c9f30e9a95f19eba299647e5f99bc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:1e8efca30bc8130a20834ee0dfeff80a62c4b129c2f849492a62f761a684d105_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:572430d7b231e93613667d049f11ad8c0570f9cda09b1a0d9c9367a31ada8d86_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:736ac64d54c2a12dc2234272862e5a52c283dca3273ed2c95cb73167bdc177fa_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:9c3a0cae8f0998134af791cf690fe6a42783f6caed795c62d67c57ebd849d983_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:2ad0563c640566cc6e55ae741b09cd353cdd8a343931596ed1ce93d49e076667_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:ba5349debff221eb5e47fac02f60c5d664a32b5cf53a654e3e983ef036acb263_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:cd373cc3574546fc2e48a58a3a7e90620494ccb24507337ef1d9a90aaf88d02d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:e448d52eede5096fdb44b6850905a71959e2f90db6fea1cdd17cca941959a9d8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:1136c984617f2a3c71a5b451c5de88f06245a9a9c83783c16a6938b6f7272f80_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:b7b9c35577b5a91539597fa90c6187e20cdbad70e8ddc55c8dc80058759be711_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:bdf691c5300034b0331daea8d92f942c3db66aa11fd726d977ae36fec1791695_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:cc46200f1bd3aa621f80fc5535c917318d50084eea265b22fe1b79871184d7bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:2d1bb2935a4c90bf9ca6b22a11a07fcaba002f2020d0ea15b82a7cf4df66713c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:5d1e7ef39de25f974949e49cbe325783e78071678e30bc3d2311710875dba2bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:8b7aa7f81955082085fbf1317ad5d747f4e19ce35c13f17c8f57eb810a1adbf7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:dc0ffee2f8c96c6ee22a2ddb06d14e08149561bab7b4195d08b59f628870af68_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4489ffd456a5d5704dccafc45b523f572f90307e57b8b353f8d8ce4c42706d4f_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4b6d6e9d9146d9834fb999ee2cbec8c56806d09bce1137bd3869fa125d064f10_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:93147af5126f419ac3fe2a0c95715b76299f27ff642483b2d14b89301367d056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:fea7a807792063cafdd6196fc68e8f7b693d7f123241c6bd64f4a00050f4a5ef_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:2eb424b36226bec87b5277eea7f5ff288409a49f99c3f60ab795bf39a07af7c1_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4974b49892263b43d379077d1d44ebf579e4da3700043a9c370e52359d852e7b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4cafcf98bfde7d9700ea55ef88c183fbf172da5d1bbc57c315df4f0d00591547_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:6f3a3fcf20935e6454baf90004604407c0e205b78d5accc10aefdb03fde0faf6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:3ec58884225aa63c85639cda97c4d7c57c7ca505c885e9a5bcbbe14bd6fc82c6_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:62fb9dd8ffc2b61de085d39ba2fb0a8192c3634a79b6cf4d9821fdc95efc1fe4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:cfb71cbaeaa7cfa8280e19f89132a8ba8fc2ea84dfb6654975c1176ee1cfac4c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:d23b6e3b510f387235b042dd3e658caab3a3af7386895a53f0967fd8bca77f80_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:2d2159059467f0f9f4eb6550d6fe1739193101d784a3098fce4f25b37f3753a7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:8839a8851cea3d34dd15274678b6f00a80394308197a877be5505f4af39b62cc_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:9133c95a0fefcec77396b1ec04b33024a0e1a3716658de9debeb92a5ffc47f31_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:c8bde9c9afc34300b7193a8b9ad1c103efd8945b350ab007d9ca6d515ac9c007_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:05094b109396ae9f2a5f346602051a7310000d08890540d1fdef3712455f51c0_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b00b82b23fbabbf3dceaca70c0bb583405ef105cbd21037dd992c2461368bd2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b222fa278dcff0824bc0340e27b6182ffc04506e54d99048f5c01c6bc604ad7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:cc032f7a173f50c51872ddbf9a9c17fa51b7fd91cb3e7b8aeba378c2725043de_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:244bd3fa3c960a9eee6d978fe9291d7b112daf2f5516840292fd0298acee5ac1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:aba46c2c0e3ab613120a479c75f9dde8c772e7ec24034886371665c5c6b2fa8d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:bb19a56cdf094216cc7a4398ce76d0e53081a6a1ce6a05af5951ac3099af84e0_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:f9c0e9e31a1aeddfefb4f24f7dd70971c1e32d6c4ac99745f81ea63afb526823_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58190"
},
{
"category": "external",
"summary": "RHBZ#2437110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437110"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58190"
},
{
"category": "external",
"summary": "https://github.com/golang/vulndb/issues/4441",
"url": "https://github.com/golang/vulndb/issues/4441"
},
{
"category": "external",
"summary": "https://go.dev/cl/709875",
"url": "https://go.dev/cl/709875"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/jnQcOYpiR2c",
"url": "https://groups.google.com/g/golang-announce/c/jnQcOYpiR2c"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4441",
"url": "https://pkg.go.dev/vuln/GO-2026-4441"
}
],
"release_date": "2026-02-05T17:48:44.693000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T15:58:30+00:00",
"details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.14/html/clusters/cluster_mce_overview#mce-install-intro",
"product_ids": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:0b03429102eea10cc0733872bbc946bbfa378966b5d62e32762bd7a59c23e9de_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:44e5c0c8674682d03d564fef5e9f668d4ab71e6f27a64ee1bd7a2cf0c47d0db1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:8422d2c6e47dbb14bc80b03734fd702c57724bf384557e9b9e1a67b85e6b8185_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:b95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2571"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:bcf5e63aba5e78b6a41dadcf73b70dc9940380c232cc2931b5da3ddfe2ecf8fc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:cc10845b259f7ac1cae5b254e090d52fb9278c89d07b0b7d44a8f6f704ec6272_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:de69593578d899842a0e98781f9c3d58338ee0925fa0b6243aedbb569a64cd96_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:e4e7e0b3fc069d4746f6584047f8b40cd774b2556f11c2cabb57923a44ef389d_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:10981e0c7a156dbfd3b8cec809c618773f3d7806a2a24c0fb1cda2e93ed6ae98_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:31f187246ac7da245c160b3afc5f1187d82cd2c039f85111a338165407d7d49d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:a498c21c46341a168e51b133e07cd390d7440c3d949ac4107cd829c5b30a4614_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:fd7b341a1e55aec25f6e3221f03d140561be81a230590907dd74fe1a021df006_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:0180391fe4bca530eb5678bf95922d10365b286279b966136b67bf8d83a9a18c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:4ea287235d5dbf2385f4d217690b54cd5ce56820735ae96d66ea03d86d4426c3_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:6eec1cff0d514e343599e9c3ca7b7aa2cbff307a28e45b19364a534be4f89dd1_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:e9d1e97601e8eaea73943489e782482703310d2e8f22a9fa234b640fcacbe64b_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:7b5496adbf0b53964790dbb22c468161e6d873912eacd00b08b955c1314d52a8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:8d86d2d4ac2459d61a1e493603c9eb7a3f0d584ad53aca2af884bf8bb8b30e71_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:c39a384c11e5242dc4b25fdd32813b4ff408b188af76df03e9757796fbc7a001_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:e0137ca5fd87bc47473fc0fc4c619ea794fac6156d84f7f4fbc689fe3328640e_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:01a0a5b524624b960339e6d40bc92eaf666532b7905b8b79a31a0ad512336f20_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:4285f5036dcf7311bc378bbe350dc33759254999de205929de90a9d218d32f78_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:b2f27f77bcbb85c3a57d40c14928a3922877270f4748cb2d03abfc4300f1925c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:e5ca54ae610b6fdd062b22d68e04e8c9638a4afe9df3dee7316a09a4a50f929d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:8f10940b7e9f69bb5f5bb40fb4575f24fc8a2f20916615d6af4eff36b0dc24b2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9e4527837150c9054e9f5eb594d557fb4642b86f1dfd109897ea63b5ff5984dd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:adfeb1a43a5b626519d6c0aee7cd7986d5afd349a4fae37d0e8821667f7fc6d3_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:d9fecb5eebf1127819cf7a3f2c2b63e050cab8864c51d4dbcad4d95921a9b698_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:0bf1c2e7d2204076757c8bbb922e11feacedcefff491bfabf481d4c27f310448_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:437680b6193c0cf77c28cb2124e01a33b7dd51063366c5781aeaf339a840b056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:cc587469525f61858f261cfbf862608aab1509bf3cf5c1e43aea63a19e579728_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:e7dc46d30ae833d7924260391781b20ffc25693073e1a4b60266caa6bd725f90_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:0712ee64942be9d307a5d89d5333a968092a685fa71c88c7eabe1498e2e3a915_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2358f82cbcf6406c86a1ec0f9ccf649dfea143797cd7d112be21c6adfdbf87_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:58d58f838d9fc2ed84635083a00725a47334ee03b8a4282000b69dedddd7a9bd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:a6950372d2ab44e865938a37f5c2dfdd55bf02cec1575353538dd28b016700f4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:2fdf436e71fee6739ae6fcd450007d76fc3fa43ba203a809f3337f22d9229bd5_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:60751156b9a51d18668dee969963569a998172b0577acaeaecff52970f3c0957_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:a86aa371b54e25d0b38ae06aea67577142b227bea31597493639ec0018391a4b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:d0955c18fa4864e073bfb9a61b42261587fc2f5f1b2f29cd0b139be5373b578a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:5e2316240808f561c9ec5b04a57e41776b7efc9a26afa9ae10f7bf7693b30d97_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:63be8363c2915b782cd9fc6007b761bc6d3ac9f77bfc35fae1c55c00974058f7_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:84d99fc9411e1a8d409d8c6bcd345cfdfee5c5986d6489a2633ffc7d4ad496b4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:a3f0cde47e922823ca537e0de8c7ddfed7422be5282e137e4db04d4e3c748104_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:2acf15b73b6db09469d53c6317088fc5f633f684f8421cc4a09f52d1056a2bb6_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a53abad37395ec507071b894e51a0086b063a1d1d27e4d029b2d3cfb51bc0d14_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a9871b54bfa689489d578155adb5a483cab73e202c092619e116e71efb476c00_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:bf6e25c9b7d66fb0c45c0ebdbbd0ee34b7a9e1cff1ac70128ee7e475812bfa7c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:4955d00cb76f1360a80679973e9d53fcf38a57e0220bc8a29728cd0360327972_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:684094906425b67784bb7f10a152cd15e354bd84a2a2d68178000122bd43794d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:8794c45c047ad41c71fbd788d35d493a9e4f78c947106391b0f67d3d572b2d06_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:d0dbcb780c8782e3b1d6abda17255bc45ec4fb5d01e29e8cb3b91bfa0a46c55a_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:0a49a64e48aed198f1ead92cd6584bd8b62813dc2621489783b9a62469d7f9e6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:2c17ef74e6ec8ae3a02268e43d9018eefaafc4493f94de3a8ca6a6fc836be6a4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:40a5278bcc8e647aaf16ccca432c4d9bec67ec074569f192420bca529fdaf113_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:eafd28f0dd525e4c11b90d01e686ada9bb6ef9e9097e81608df8c04ed15d513b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:0f47ceec837a12497ee911279b0fba82481e72ee163670a8674630f948d39aba_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:32166ec828cbc58224e236a86bd7439464379272f473bcdcd2ec765f7081a5b7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:65c8b3770f82794d55d269a004948a8e2c54cbd99b09552b4cdb91475baee5a2_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:a3c91540f20f094fee24224bce21018aa671849e7f75aece1bddfb6c945289d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:0b03429102eea10cc0733872bbc946bbfa378966b5d62e32762bd7a59c23e9de_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:44e5c0c8674682d03d564fef5e9f668d4ab71e6f27a64ee1bd7a2cf0c47d0db1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:8422d2c6e47dbb14bc80b03734fd702c57724bf384557e9b9e1a67b85e6b8185_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:b95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:661171f5a869f110ada60973b2c8289d80df4e7e7373e13bdb68bd5f59be91ea_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:9c1f70be52ba4c49de28376802bf2d73fe0a3bc44282ace7606cfb123233da4c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:ced6dbca20663462d35a97ca21836503e9987f29d37896ce8c5fb89650268762_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:e374c0aad61fb4a2af3dd0e8310286e45e283dac47c8e766f34cabf1d8cc2563_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:27f2b11d9017cad3af4f872ce382b54492bae329c499f4423c6ef7342522f844_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:371f8ec4475c9af90dbaf1a76a6b1217e195d3c371b0903137df92e8733371db_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:568aee9b50f1b79b0d3edea5e5a4f877ad8fcfe6f3e81e6f3cf049774dfe4bc9_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:e20f2aa3083e6d4100b4a38df9b416ac8b0f6a475fffff9754437fe4697dbd94_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:7d16492d3d30bb614c6155b2a3de1a3cfcd55100c06078c96557831f9c19221c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:85f7963a86254181a79cd48a98130c4b0cd50abe6d704940dac5958ab9d11863_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:89a50676a19cc0187665f7c06ddd717a37df80c4b0eccb96447380b7ba2db663_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:e6d522327993a91ed50b12745b26db70b5f7b374bb015ef7165ef7c3b59529b4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:1052d9b0befb2fd315b445ed4ccca0490075fa82d2752f1507f3daba6476d87a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:5511144641603a3fc4c93ae9d7253ba2fccc55f8806913a4e08ec9f3b919d5c8_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:b8e2d11f40a5a29f0a3fc870dafd8ce6c72e8983f44d5084814b0cc56d410fe7_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:fd3eb25ba4e8baaf13bdebf9a5c70d20d79a642bccd808c8dfbec52b403a2608_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:47265159cef044b5a4086af6506b3ad570d0966d80a5dd0c69d391ced37e2572_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:a6dc13baffa1382bc1316588eba2e63cfc1630d059b3b9ab53dd53c98d135220_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d69051165ba4538e28097a2caa510ae3bab59223e473eb9286763a0c8e2137d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:e04fa41cee83d89a88fc68bc38aadaa69f9c9f30e9a95f19eba299647e5f99bc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:1e8efca30bc8130a20834ee0dfeff80a62c4b129c2f849492a62f761a684d105_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:572430d7b231e93613667d049f11ad8c0570f9cda09b1a0d9c9367a31ada8d86_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:736ac64d54c2a12dc2234272862e5a52c283dca3273ed2c95cb73167bdc177fa_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:9c3a0cae8f0998134af791cf690fe6a42783f6caed795c62d67c57ebd849d983_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:2ad0563c640566cc6e55ae741b09cd353cdd8a343931596ed1ce93d49e076667_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:ba5349debff221eb5e47fac02f60c5d664a32b5cf53a654e3e983ef036acb263_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:cd373cc3574546fc2e48a58a3a7e90620494ccb24507337ef1d9a90aaf88d02d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:e448d52eede5096fdb44b6850905a71959e2f90db6fea1cdd17cca941959a9d8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:1136c984617f2a3c71a5b451c5de88f06245a9a9c83783c16a6938b6f7272f80_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:b7b9c35577b5a91539597fa90c6187e20cdbad70e8ddc55c8dc80058759be711_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:bdf691c5300034b0331daea8d92f942c3db66aa11fd726d977ae36fec1791695_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:cc46200f1bd3aa621f80fc5535c917318d50084eea265b22fe1b79871184d7bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:2d1bb2935a4c90bf9ca6b22a11a07fcaba002f2020d0ea15b82a7cf4df66713c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:5d1e7ef39de25f974949e49cbe325783e78071678e30bc3d2311710875dba2bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:8b7aa7f81955082085fbf1317ad5d747f4e19ce35c13f17c8f57eb810a1adbf7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:dc0ffee2f8c96c6ee22a2ddb06d14e08149561bab7b4195d08b59f628870af68_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4489ffd456a5d5704dccafc45b523f572f90307e57b8b353f8d8ce4c42706d4f_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4b6d6e9d9146d9834fb999ee2cbec8c56806d09bce1137bd3869fa125d064f10_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:93147af5126f419ac3fe2a0c95715b76299f27ff642483b2d14b89301367d056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:fea7a807792063cafdd6196fc68e8f7b693d7f123241c6bd64f4a00050f4a5ef_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:2eb424b36226bec87b5277eea7f5ff288409a49f99c3f60ab795bf39a07af7c1_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4974b49892263b43d379077d1d44ebf579e4da3700043a9c370e52359d852e7b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4cafcf98bfde7d9700ea55ef88c183fbf172da5d1bbc57c315df4f0d00591547_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:6f3a3fcf20935e6454baf90004604407c0e205b78d5accc10aefdb03fde0faf6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:3ec58884225aa63c85639cda97c4d7c57c7ca505c885e9a5bcbbe14bd6fc82c6_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:62fb9dd8ffc2b61de085d39ba2fb0a8192c3634a79b6cf4d9821fdc95efc1fe4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:cfb71cbaeaa7cfa8280e19f89132a8ba8fc2ea84dfb6654975c1176ee1cfac4c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:d23b6e3b510f387235b042dd3e658caab3a3af7386895a53f0967fd8bca77f80_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:2d2159059467f0f9f4eb6550d6fe1739193101d784a3098fce4f25b37f3753a7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:8839a8851cea3d34dd15274678b6f00a80394308197a877be5505f4af39b62cc_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:9133c95a0fefcec77396b1ec04b33024a0e1a3716658de9debeb92a5ffc47f31_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:c8bde9c9afc34300b7193a8b9ad1c103efd8945b350ab007d9ca6d515ac9c007_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:05094b109396ae9f2a5f346602051a7310000d08890540d1fdef3712455f51c0_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b00b82b23fbabbf3dceaca70c0bb583405ef105cbd21037dd992c2461368bd2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b222fa278dcff0824bc0340e27b6182ffc04506e54d99048f5c01c6bc604ad7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:cc032f7a173f50c51872ddbf9a9c17fa51b7fd91cb3e7b8aeba378c2725043de_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:244bd3fa3c960a9eee6d978fe9291d7b112daf2f5516840292fd0298acee5ac1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:aba46c2c0e3ab613120a479c75f9dde8c772e7ec24034886371665c5c6b2fa8d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:bb19a56cdf094216cc7a4398ce76d0e53081a6a1ce6a05af5951ac3099af84e0_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:f9c0e9e31a1aeddfefb4f24f7dd70971c1e32d6c4ac99745f81ea63afb526823_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:bcf5e63aba5e78b6a41dadcf73b70dc9940380c232cc2931b5da3ddfe2ecf8fc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:cc10845b259f7ac1cae5b254e090d52fb9278c89d07b0b7d44a8f6f704ec6272_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:de69593578d899842a0e98781f9c3d58338ee0925fa0b6243aedbb569a64cd96_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:e4e7e0b3fc069d4746f6584047f8b40cd774b2556f11c2cabb57923a44ef389d_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:10981e0c7a156dbfd3b8cec809c618773f3d7806a2a24c0fb1cda2e93ed6ae98_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:31f187246ac7da245c160b3afc5f1187d82cd2c039f85111a338165407d7d49d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:a498c21c46341a168e51b133e07cd390d7440c3d949ac4107cd829c5b30a4614_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:fd7b341a1e55aec25f6e3221f03d140561be81a230590907dd74fe1a021df006_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:0180391fe4bca530eb5678bf95922d10365b286279b966136b67bf8d83a9a18c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:4ea287235d5dbf2385f4d217690b54cd5ce56820735ae96d66ea03d86d4426c3_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:6eec1cff0d514e343599e9c3ca7b7aa2cbff307a28e45b19364a534be4f89dd1_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:e9d1e97601e8eaea73943489e782482703310d2e8f22a9fa234b640fcacbe64b_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:7b5496adbf0b53964790dbb22c468161e6d873912eacd00b08b955c1314d52a8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:8d86d2d4ac2459d61a1e493603c9eb7a3f0d584ad53aca2af884bf8bb8b30e71_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:c39a384c11e5242dc4b25fdd32813b4ff408b188af76df03e9757796fbc7a001_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:e0137ca5fd87bc47473fc0fc4c619ea794fac6156d84f7f4fbc689fe3328640e_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:01a0a5b524624b960339e6d40bc92eaf666532b7905b8b79a31a0ad512336f20_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:4285f5036dcf7311bc378bbe350dc33759254999de205929de90a9d218d32f78_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:b2f27f77bcbb85c3a57d40c14928a3922877270f4748cb2d03abfc4300f1925c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:e5ca54ae610b6fdd062b22d68e04e8c9638a4afe9df3dee7316a09a4a50f929d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:8f10940b7e9f69bb5f5bb40fb4575f24fc8a2f20916615d6af4eff36b0dc24b2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9e4527837150c9054e9f5eb594d557fb4642b86f1dfd109897ea63b5ff5984dd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:adfeb1a43a5b626519d6c0aee7cd7986d5afd349a4fae37d0e8821667f7fc6d3_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:d9fecb5eebf1127819cf7a3f2c2b63e050cab8864c51d4dbcad4d95921a9b698_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:0bf1c2e7d2204076757c8bbb922e11feacedcefff491bfabf481d4c27f310448_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:437680b6193c0cf77c28cb2124e01a33b7dd51063366c5781aeaf339a840b056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:cc587469525f61858f261cfbf862608aab1509bf3cf5c1e43aea63a19e579728_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:e7dc46d30ae833d7924260391781b20ffc25693073e1a4b60266caa6bd725f90_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:0712ee64942be9d307a5d89d5333a968092a685fa71c88c7eabe1498e2e3a915_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2358f82cbcf6406c86a1ec0f9ccf649dfea143797cd7d112be21c6adfdbf87_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:58d58f838d9fc2ed84635083a00725a47334ee03b8a4282000b69dedddd7a9bd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:a6950372d2ab44e865938a37f5c2dfdd55bf02cec1575353538dd28b016700f4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:2fdf436e71fee6739ae6fcd450007d76fc3fa43ba203a809f3337f22d9229bd5_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:60751156b9a51d18668dee969963569a998172b0577acaeaecff52970f3c0957_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:a86aa371b54e25d0b38ae06aea67577142b227bea31597493639ec0018391a4b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:d0955c18fa4864e073bfb9a61b42261587fc2f5f1b2f29cd0b139be5373b578a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:5e2316240808f561c9ec5b04a57e41776b7efc9a26afa9ae10f7bf7693b30d97_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:63be8363c2915b782cd9fc6007b761bc6d3ac9f77bfc35fae1c55c00974058f7_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:84d99fc9411e1a8d409d8c6bcd345cfdfee5c5986d6489a2633ffc7d4ad496b4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:a3f0cde47e922823ca537e0de8c7ddfed7422be5282e137e4db04d4e3c748104_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:2acf15b73b6db09469d53c6317088fc5f633f684f8421cc4a09f52d1056a2bb6_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a53abad37395ec507071b894e51a0086b063a1d1d27e4d029b2d3cfb51bc0d14_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a9871b54bfa689489d578155adb5a483cab73e202c092619e116e71efb476c00_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:bf6e25c9b7d66fb0c45c0ebdbbd0ee34b7a9e1cff1ac70128ee7e475812bfa7c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:4955d00cb76f1360a80679973e9d53fcf38a57e0220bc8a29728cd0360327972_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:684094906425b67784bb7f10a152cd15e354bd84a2a2d68178000122bd43794d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:8794c45c047ad41c71fbd788d35d493a9e4f78c947106391b0f67d3d572b2d06_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:d0dbcb780c8782e3b1d6abda17255bc45ec4fb5d01e29e8cb3b91bfa0a46c55a_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:0a49a64e48aed198f1ead92cd6584bd8b62813dc2621489783b9a62469d7f9e6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:2c17ef74e6ec8ae3a02268e43d9018eefaafc4493f94de3a8ca6a6fc836be6a4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:40a5278bcc8e647aaf16ccca432c4d9bec67ec074569f192420bca529fdaf113_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:eafd28f0dd525e4c11b90d01e686ada9bb6ef9e9097e81608df8c04ed15d513b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:0f47ceec837a12497ee911279b0fba82481e72ee163670a8674630f948d39aba_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:32166ec828cbc58224e236a86bd7439464379272f473bcdcd2ec765f7081a5b7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:65c8b3770f82794d55d269a004948a8e2c54cbd99b09552b4cdb91475baee5a2_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:a3c91540f20f094fee24224bce21018aa671849e7f75aece1bddfb6c945289d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:0b03429102eea10cc0733872bbc946bbfa378966b5d62e32762bd7a59c23e9de_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:44e5c0c8674682d03d564fef5e9f668d4ab71e6f27a64ee1bd7a2cf0c47d0db1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:8422d2c6e47dbb14bc80b03734fd702c57724bf384557e9b9e1a67b85e6b8185_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:b95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:661171f5a869f110ada60973b2c8289d80df4e7e7373e13bdb68bd5f59be91ea_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:9c1f70be52ba4c49de28376802bf2d73fe0a3bc44282ace7606cfb123233da4c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:ced6dbca20663462d35a97ca21836503e9987f29d37896ce8c5fb89650268762_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:e374c0aad61fb4a2af3dd0e8310286e45e283dac47c8e766f34cabf1d8cc2563_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:27f2b11d9017cad3af4f872ce382b54492bae329c499f4423c6ef7342522f844_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:371f8ec4475c9af90dbaf1a76a6b1217e195d3c371b0903137df92e8733371db_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:568aee9b50f1b79b0d3edea5e5a4f877ad8fcfe6f3e81e6f3cf049774dfe4bc9_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:e20f2aa3083e6d4100b4a38df9b416ac8b0f6a475fffff9754437fe4697dbd94_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:7d16492d3d30bb614c6155b2a3de1a3cfcd55100c06078c96557831f9c19221c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:85f7963a86254181a79cd48a98130c4b0cd50abe6d704940dac5958ab9d11863_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:89a50676a19cc0187665f7c06ddd717a37df80c4b0eccb96447380b7ba2db663_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:e6d522327993a91ed50b12745b26db70b5f7b374bb015ef7165ef7c3b59529b4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:1052d9b0befb2fd315b445ed4ccca0490075fa82d2752f1507f3daba6476d87a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:5511144641603a3fc4c93ae9d7253ba2fccc55f8806913a4e08ec9f3b919d5c8_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:b8e2d11f40a5a29f0a3fc870dafd8ce6c72e8983f44d5084814b0cc56d410fe7_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:fd3eb25ba4e8baaf13bdebf9a5c70d20d79a642bccd808c8dfbec52b403a2608_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:47265159cef044b5a4086af6506b3ad570d0966d80a5dd0c69d391ced37e2572_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:a6dc13baffa1382bc1316588eba2e63cfc1630d059b3b9ab53dd53c98d135220_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d69051165ba4538e28097a2caa510ae3bab59223e473eb9286763a0c8e2137d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:e04fa41cee83d89a88fc68bc38aadaa69f9c9f30e9a95f19eba299647e5f99bc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:1e8efca30bc8130a20834ee0dfeff80a62c4b129c2f849492a62f761a684d105_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:572430d7b231e93613667d049f11ad8c0570f9cda09b1a0d9c9367a31ada8d86_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:736ac64d54c2a12dc2234272862e5a52c283dca3273ed2c95cb73167bdc177fa_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:9c3a0cae8f0998134af791cf690fe6a42783f6caed795c62d67c57ebd849d983_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:2ad0563c640566cc6e55ae741b09cd353cdd8a343931596ed1ce93d49e076667_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:ba5349debff221eb5e47fac02f60c5d664a32b5cf53a654e3e983ef036acb263_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:cd373cc3574546fc2e48a58a3a7e90620494ccb24507337ef1d9a90aaf88d02d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:e448d52eede5096fdb44b6850905a71959e2f90db6fea1cdd17cca941959a9d8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:1136c984617f2a3c71a5b451c5de88f06245a9a9c83783c16a6938b6f7272f80_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:b7b9c35577b5a91539597fa90c6187e20cdbad70e8ddc55c8dc80058759be711_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:bdf691c5300034b0331daea8d92f942c3db66aa11fd726d977ae36fec1791695_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:cc46200f1bd3aa621f80fc5535c917318d50084eea265b22fe1b79871184d7bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:2d1bb2935a4c90bf9ca6b22a11a07fcaba002f2020d0ea15b82a7cf4df66713c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:5d1e7ef39de25f974949e49cbe325783e78071678e30bc3d2311710875dba2bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:8b7aa7f81955082085fbf1317ad5d747f4e19ce35c13f17c8f57eb810a1adbf7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:dc0ffee2f8c96c6ee22a2ddb06d14e08149561bab7b4195d08b59f628870af68_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4489ffd456a5d5704dccafc45b523f572f90307e57b8b353f8d8ce4c42706d4f_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4b6d6e9d9146d9834fb999ee2cbec8c56806d09bce1137bd3869fa125d064f10_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:93147af5126f419ac3fe2a0c95715b76299f27ff642483b2d14b89301367d056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:fea7a807792063cafdd6196fc68e8f7b693d7f123241c6bd64f4a00050f4a5ef_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:2eb424b36226bec87b5277eea7f5ff288409a49f99c3f60ab795bf39a07af7c1_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4974b49892263b43d379077d1d44ebf579e4da3700043a9c370e52359d852e7b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4cafcf98bfde7d9700ea55ef88c183fbf172da5d1bbc57c315df4f0d00591547_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:6f3a3fcf20935e6454baf90004604407c0e205b78d5accc10aefdb03fde0faf6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:3ec58884225aa63c85639cda97c4d7c57c7ca505c885e9a5bcbbe14bd6fc82c6_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:62fb9dd8ffc2b61de085d39ba2fb0a8192c3634a79b6cf4d9821fdc95efc1fe4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:cfb71cbaeaa7cfa8280e19f89132a8ba8fc2ea84dfb6654975c1176ee1cfac4c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:d23b6e3b510f387235b042dd3e658caab3a3af7386895a53f0967fd8bca77f80_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:2d2159059467f0f9f4eb6550d6fe1739193101d784a3098fce4f25b37f3753a7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:8839a8851cea3d34dd15274678b6f00a80394308197a877be5505f4af39b62cc_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:9133c95a0fefcec77396b1ec04b33024a0e1a3716658de9debeb92a5ffc47f31_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:c8bde9c9afc34300b7193a8b9ad1c103efd8945b350ab007d9ca6d515ac9c007_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:05094b109396ae9f2a5f346602051a7310000d08890540d1fdef3712455f51c0_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b00b82b23fbabbf3dceaca70c0bb583405ef105cbd21037dd992c2461368bd2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b222fa278dcff0824bc0340e27b6182ffc04506e54d99048f5c01c6bc604ad7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:cc032f7a173f50c51872ddbf9a9c17fa51b7fd91cb3e7b8aeba378c2725043de_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:244bd3fa3c960a9eee6d978fe9291d7b112daf2f5516840292fd0298acee5ac1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:aba46c2c0e3ab613120a479c75f9dde8c772e7ec24034886371665c5c6b2fa8d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:bb19a56cdf094216cc7a4398ce76d0e53081a6a1ce6a05af5951ac3099af84e0_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:f9c0e9e31a1aeddfefb4f24f7dd70971c1e32d6c4ac99745f81ea63afb526823_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang.org/x/net/html: Infinite parsing loop in golang.org/x/net"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:bcf5e63aba5e78b6a41dadcf73b70dc9940380c232cc2931b5da3ddfe2ecf8fc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:cc10845b259f7ac1cae5b254e090d52fb9278c89d07b0b7d44a8f6f704ec6272_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:de69593578d899842a0e98781f9c3d58338ee0925fa0b6243aedbb569a64cd96_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:e4e7e0b3fc069d4746f6584047f8b40cd774b2556f11c2cabb57923a44ef389d_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:10981e0c7a156dbfd3b8cec809c618773f3d7806a2a24c0fb1cda2e93ed6ae98_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:31f187246ac7da245c160b3afc5f1187d82cd2c039f85111a338165407d7d49d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:a498c21c46341a168e51b133e07cd390d7440c3d949ac4107cd829c5b30a4614_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:fd7b341a1e55aec25f6e3221f03d140561be81a230590907dd74fe1a021df006_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:0180391fe4bca530eb5678bf95922d10365b286279b966136b67bf8d83a9a18c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:4ea287235d5dbf2385f4d217690b54cd5ce56820735ae96d66ea03d86d4426c3_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:6eec1cff0d514e343599e9c3ca7b7aa2cbff307a28e45b19364a534be4f89dd1_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:e9d1e97601e8eaea73943489e782482703310d2e8f22a9fa234b640fcacbe64b_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:7b5496adbf0b53964790dbb22c468161e6d873912eacd00b08b955c1314d52a8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:8d86d2d4ac2459d61a1e493603c9eb7a3f0d584ad53aca2af884bf8bb8b30e71_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:c39a384c11e5242dc4b25fdd32813b4ff408b188af76df03e9757796fbc7a001_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:e0137ca5fd87bc47473fc0fc4c619ea794fac6156d84f7f4fbc689fe3328640e_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:8f10940b7e9f69bb5f5bb40fb4575f24fc8a2f20916615d6af4eff36b0dc24b2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9e4527837150c9054e9f5eb594d557fb4642b86f1dfd109897ea63b5ff5984dd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:adfeb1a43a5b626519d6c0aee7cd7986d5afd349a4fae37d0e8821667f7fc6d3_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:d9fecb5eebf1127819cf7a3f2c2b63e050cab8864c51d4dbcad4d95921a9b698_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:0bf1c2e7d2204076757c8bbb922e11feacedcefff491bfabf481d4c27f310448_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:437680b6193c0cf77c28cb2124e01a33b7dd51063366c5781aeaf339a840b056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:cc587469525f61858f261cfbf862608aab1509bf3cf5c1e43aea63a19e579728_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:e7dc46d30ae833d7924260391781b20ffc25693073e1a4b60266caa6bd725f90_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:0712ee64942be9d307a5d89d5333a968092a685fa71c88c7eabe1498e2e3a915_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2358f82cbcf6406c86a1ec0f9ccf649dfea143797cd7d112be21c6adfdbf87_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:58d58f838d9fc2ed84635083a00725a47334ee03b8a4282000b69dedddd7a9bd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:a6950372d2ab44e865938a37f5c2dfdd55bf02cec1575353538dd28b016700f4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:2fdf436e71fee6739ae6fcd450007d76fc3fa43ba203a809f3337f22d9229bd5_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:60751156b9a51d18668dee969963569a998172b0577acaeaecff52970f3c0957_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:a86aa371b54e25d0b38ae06aea67577142b227bea31597493639ec0018391a4b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:d0955c18fa4864e073bfb9a61b42261587fc2f5f1b2f29cd0b139be5373b578a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:5e2316240808f561c9ec5b04a57e41776b7efc9a26afa9ae10f7bf7693b30d97_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:63be8363c2915b782cd9fc6007b761bc6d3ac9f77bfc35fae1c55c00974058f7_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:84d99fc9411e1a8d409d8c6bcd345cfdfee5c5986d6489a2633ffc7d4ad496b4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:a3f0cde47e922823ca537e0de8c7ddfed7422be5282e137e4db04d4e3c748104_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:2acf15b73b6db09469d53c6317088fc5f633f684f8421cc4a09f52d1056a2bb6_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a53abad37395ec507071b894e51a0086b063a1d1d27e4d029b2d3cfb51bc0d14_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a9871b54bfa689489d578155adb5a483cab73e202c092619e116e71efb476c00_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:bf6e25c9b7d66fb0c45c0ebdbbd0ee34b7a9e1cff1ac70128ee7e475812bfa7c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:4955d00cb76f1360a80679973e9d53fcf38a57e0220bc8a29728cd0360327972_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:684094906425b67784bb7f10a152cd15e354bd84a2a2d68178000122bd43794d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:8794c45c047ad41c71fbd788d35d493a9e4f78c947106391b0f67d3d572b2d06_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:d0dbcb780c8782e3b1d6abda17255bc45ec4fb5d01e29e8cb3b91bfa0a46c55a_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:0a49a64e48aed198f1ead92cd6584bd8b62813dc2621489783b9a62469d7f9e6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:2c17ef74e6ec8ae3a02268e43d9018eefaafc4493f94de3a8ca6a6fc836be6a4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:40a5278bcc8e647aaf16ccca432c4d9bec67ec074569f192420bca529fdaf113_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:eafd28f0dd525e4c11b90d01e686ada9bb6ef9e9097e81608df8c04ed15d513b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:0f47ceec837a12497ee911279b0fba82481e72ee163670a8674630f948d39aba_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:32166ec828cbc58224e236a86bd7439464379272f473bcdcd2ec765f7081a5b7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:65c8b3770f82794d55d269a004948a8e2c54cbd99b09552b4cdb91475baee5a2_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:a3c91540f20f094fee24224bce21018aa671849e7f75aece1bddfb6c945289d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:0b03429102eea10cc0733872bbc946bbfa378966b5d62e32762bd7a59c23e9de_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:44e5c0c8674682d03d564fef5e9f668d4ab71e6f27a64ee1bd7a2cf0c47d0db1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:8422d2c6e47dbb14bc80b03734fd702c57724bf384557e9b9e1a67b85e6b8185_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:b95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:661171f5a869f110ada60973b2c8289d80df4e7e7373e13bdb68bd5f59be91ea_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:9c1f70be52ba4c49de28376802bf2d73fe0a3bc44282ace7606cfb123233da4c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:ced6dbca20663462d35a97ca21836503e9987f29d37896ce8c5fb89650268762_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:e374c0aad61fb4a2af3dd0e8310286e45e283dac47c8e766f34cabf1d8cc2563_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:27f2b11d9017cad3af4f872ce382b54492bae329c499f4423c6ef7342522f844_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:371f8ec4475c9af90dbaf1a76a6b1217e195d3c371b0903137df92e8733371db_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:568aee9b50f1b79b0d3edea5e5a4f877ad8fcfe6f3e81e6f3cf049774dfe4bc9_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:e20f2aa3083e6d4100b4a38df9b416ac8b0f6a475fffff9754437fe4697dbd94_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:7d16492d3d30bb614c6155b2a3de1a3cfcd55100c06078c96557831f9c19221c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:85f7963a86254181a79cd48a98130c4b0cd50abe6d704940dac5958ab9d11863_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:89a50676a19cc0187665f7c06ddd717a37df80c4b0eccb96447380b7ba2db663_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:e6d522327993a91ed50b12745b26db70b5f7b374bb015ef7165ef7c3b59529b4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:1052d9b0befb2fd315b445ed4ccca0490075fa82d2752f1507f3daba6476d87a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:5511144641603a3fc4c93ae9d7253ba2fccc55f8806913a4e08ec9f3b919d5c8_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:b8e2d11f40a5a29f0a3fc870dafd8ce6c72e8983f44d5084814b0cc56d410fe7_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:fd3eb25ba4e8baaf13bdebf9a5c70d20d79a642bccd808c8dfbec52b403a2608_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:1e8efca30bc8130a20834ee0dfeff80a62c4b129c2f849492a62f761a684d105_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:572430d7b231e93613667d049f11ad8c0570f9cda09b1a0d9c9367a31ada8d86_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:736ac64d54c2a12dc2234272862e5a52c283dca3273ed2c95cb73167bdc177fa_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:9c3a0cae8f0998134af791cf690fe6a42783f6caed795c62d67c57ebd849d983_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:2ad0563c640566cc6e55ae741b09cd353cdd8a343931596ed1ce93d49e076667_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:ba5349debff221eb5e47fac02f60c5d664a32b5cf53a654e3e983ef036acb263_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:cd373cc3574546fc2e48a58a3a7e90620494ccb24507337ef1d9a90aaf88d02d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:e448d52eede5096fdb44b6850905a71959e2f90db6fea1cdd17cca941959a9d8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:1136c984617f2a3c71a5b451c5de88f06245a9a9c83783c16a6938b6f7272f80_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:b7b9c35577b5a91539597fa90c6187e20cdbad70e8ddc55c8dc80058759be711_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:bdf691c5300034b0331daea8d92f942c3db66aa11fd726d977ae36fec1791695_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:cc46200f1bd3aa621f80fc5535c917318d50084eea265b22fe1b79871184d7bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:2d1bb2935a4c90bf9ca6b22a11a07fcaba002f2020d0ea15b82a7cf4df66713c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:5d1e7ef39de25f974949e49cbe325783e78071678e30bc3d2311710875dba2bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:8b7aa7f81955082085fbf1317ad5d747f4e19ce35c13f17c8f57eb810a1adbf7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:dc0ffee2f8c96c6ee22a2ddb06d14e08149561bab7b4195d08b59f628870af68_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4489ffd456a5d5704dccafc45b523f572f90307e57b8b353f8d8ce4c42706d4f_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4b6d6e9d9146d9834fb999ee2cbec8c56806d09bce1137bd3869fa125d064f10_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:93147af5126f419ac3fe2a0c95715b76299f27ff642483b2d14b89301367d056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:fea7a807792063cafdd6196fc68e8f7b693d7f123241c6bd64f4a00050f4a5ef_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:2eb424b36226bec87b5277eea7f5ff288409a49f99c3f60ab795bf39a07af7c1_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4974b49892263b43d379077d1d44ebf579e4da3700043a9c370e52359d852e7b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4cafcf98bfde7d9700ea55ef88c183fbf172da5d1bbc57c315df4f0d00591547_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:6f3a3fcf20935e6454baf90004604407c0e205b78d5accc10aefdb03fde0faf6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:3ec58884225aa63c85639cda97c4d7c57c7ca505c885e9a5bcbbe14bd6fc82c6_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:62fb9dd8ffc2b61de085d39ba2fb0a8192c3634a79b6cf4d9821fdc95efc1fe4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:cfb71cbaeaa7cfa8280e19f89132a8ba8fc2ea84dfb6654975c1176ee1cfac4c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:d23b6e3b510f387235b042dd3e658caab3a3af7386895a53f0967fd8bca77f80_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:2d2159059467f0f9f4eb6550d6fe1739193101d784a3098fce4f25b37f3753a7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:8839a8851cea3d34dd15274678b6f00a80394308197a877be5505f4af39b62cc_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:9133c95a0fefcec77396b1ec04b33024a0e1a3716658de9debeb92a5ffc47f31_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:c8bde9c9afc34300b7193a8b9ad1c103efd8945b350ab007d9ca6d515ac9c007_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:05094b109396ae9f2a5f346602051a7310000d08890540d1fdef3712455f51c0_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b00b82b23fbabbf3dceaca70c0bb583405ef105cbd21037dd992c2461368bd2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b222fa278dcff0824bc0340e27b6182ffc04506e54d99048f5c01c6bc604ad7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:cc032f7a173f50c51872ddbf9a9c17fa51b7fd91cb3e7b8aeba378c2725043de_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:244bd3fa3c960a9eee6d978fe9291d7b112daf2f5516840292fd0298acee5ac1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:aba46c2c0e3ab613120a479c75f9dde8c772e7ec24034886371665c5c6b2fa8d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:bb19a56cdf094216cc7a4398ce76d0e53081a6a1ce6a05af5951ac3099af84e0_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:f9c0e9e31a1aeddfefb4f24f7dd70971c1e32d6c4ac99745f81ea63afb526823_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:01a0a5b524624b960339e6d40bc92eaf666532b7905b8b79a31a0ad512336f20_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:4285f5036dcf7311bc378bbe350dc33759254999de205929de90a9d218d32f78_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:b2f27f77bcbb85c3a57d40c14928a3922877270f4748cb2d03abfc4300f1925c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:e5ca54ae610b6fdd062b22d68e04e8c9638a4afe9df3dee7316a09a4a50f929d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:47265159cef044b5a4086af6506b3ad570d0966d80a5dd0c69d391ced37e2572_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:a6dc13baffa1382bc1316588eba2e63cfc1630d059b3b9ab53dd53c98d135220_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d69051165ba4538e28097a2caa510ae3bab59223e473eb9286763a0c8e2137d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:e04fa41cee83d89a88fc68bc38aadaa69f9c9f30e9a95f19eba299647e5f99bc_ppc64le"
],
"known_not_affected": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:bcf5e63aba5e78b6a41dadcf73b70dc9940380c232cc2931b5da3ddfe2ecf8fc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:cc10845b259f7ac1cae5b254e090d52fb9278c89d07b0b7d44a8f6f704ec6272_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:de69593578d899842a0e98781f9c3d58338ee0925fa0b6243aedbb569a64cd96_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:e4e7e0b3fc069d4746f6584047f8b40cd774b2556f11c2cabb57923a44ef389d_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:10981e0c7a156dbfd3b8cec809c618773f3d7806a2a24c0fb1cda2e93ed6ae98_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:31f187246ac7da245c160b3afc5f1187d82cd2c039f85111a338165407d7d49d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:a498c21c46341a168e51b133e07cd390d7440c3d949ac4107cd829c5b30a4614_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:fd7b341a1e55aec25f6e3221f03d140561be81a230590907dd74fe1a021df006_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:0180391fe4bca530eb5678bf95922d10365b286279b966136b67bf8d83a9a18c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:4ea287235d5dbf2385f4d217690b54cd5ce56820735ae96d66ea03d86d4426c3_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:6eec1cff0d514e343599e9c3ca7b7aa2cbff307a28e45b19364a534be4f89dd1_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:e9d1e97601e8eaea73943489e782482703310d2e8f22a9fa234b640fcacbe64b_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:7b5496adbf0b53964790dbb22c468161e6d873912eacd00b08b955c1314d52a8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:8d86d2d4ac2459d61a1e493603c9eb7a3f0d584ad53aca2af884bf8bb8b30e71_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:c39a384c11e5242dc4b25fdd32813b4ff408b188af76df03e9757796fbc7a001_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:e0137ca5fd87bc47473fc0fc4c619ea794fac6156d84f7f4fbc689fe3328640e_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:8f10940b7e9f69bb5f5bb40fb4575f24fc8a2f20916615d6af4eff36b0dc24b2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9e4527837150c9054e9f5eb594d557fb4642b86f1dfd109897ea63b5ff5984dd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:adfeb1a43a5b626519d6c0aee7cd7986d5afd349a4fae37d0e8821667f7fc6d3_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:d9fecb5eebf1127819cf7a3f2c2b63e050cab8864c51d4dbcad4d95921a9b698_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:0bf1c2e7d2204076757c8bbb922e11feacedcefff491bfabf481d4c27f310448_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:437680b6193c0cf77c28cb2124e01a33b7dd51063366c5781aeaf339a840b056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:cc587469525f61858f261cfbf862608aab1509bf3cf5c1e43aea63a19e579728_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:e7dc46d30ae833d7924260391781b20ffc25693073e1a4b60266caa6bd725f90_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:0712ee64942be9d307a5d89d5333a968092a685fa71c88c7eabe1498e2e3a915_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2358f82cbcf6406c86a1ec0f9ccf649dfea143797cd7d112be21c6adfdbf87_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:58d58f838d9fc2ed84635083a00725a47334ee03b8a4282000b69dedddd7a9bd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:a6950372d2ab44e865938a37f5c2dfdd55bf02cec1575353538dd28b016700f4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:2fdf436e71fee6739ae6fcd450007d76fc3fa43ba203a809f3337f22d9229bd5_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:60751156b9a51d18668dee969963569a998172b0577acaeaecff52970f3c0957_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:a86aa371b54e25d0b38ae06aea67577142b227bea31597493639ec0018391a4b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:d0955c18fa4864e073bfb9a61b42261587fc2f5f1b2f29cd0b139be5373b578a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:5e2316240808f561c9ec5b04a57e41776b7efc9a26afa9ae10f7bf7693b30d97_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:63be8363c2915b782cd9fc6007b761bc6d3ac9f77bfc35fae1c55c00974058f7_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:84d99fc9411e1a8d409d8c6bcd345cfdfee5c5986d6489a2633ffc7d4ad496b4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:a3f0cde47e922823ca537e0de8c7ddfed7422be5282e137e4db04d4e3c748104_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:2acf15b73b6db09469d53c6317088fc5f633f684f8421cc4a09f52d1056a2bb6_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a53abad37395ec507071b894e51a0086b063a1d1d27e4d029b2d3cfb51bc0d14_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a9871b54bfa689489d578155adb5a483cab73e202c092619e116e71efb476c00_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:bf6e25c9b7d66fb0c45c0ebdbbd0ee34b7a9e1cff1ac70128ee7e475812bfa7c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:4955d00cb76f1360a80679973e9d53fcf38a57e0220bc8a29728cd0360327972_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:684094906425b67784bb7f10a152cd15e354bd84a2a2d68178000122bd43794d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:8794c45c047ad41c71fbd788d35d493a9e4f78c947106391b0f67d3d572b2d06_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:d0dbcb780c8782e3b1d6abda17255bc45ec4fb5d01e29e8cb3b91bfa0a46c55a_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:0a49a64e48aed198f1ead92cd6584bd8b62813dc2621489783b9a62469d7f9e6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:2c17ef74e6ec8ae3a02268e43d9018eefaafc4493f94de3a8ca6a6fc836be6a4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:40a5278bcc8e647aaf16ccca432c4d9bec67ec074569f192420bca529fdaf113_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:eafd28f0dd525e4c11b90d01e686ada9bb6ef9e9097e81608df8c04ed15d513b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:0f47ceec837a12497ee911279b0fba82481e72ee163670a8674630f948d39aba_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:32166ec828cbc58224e236a86bd7439464379272f473bcdcd2ec765f7081a5b7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:65c8b3770f82794d55d269a004948a8e2c54cbd99b09552b4cdb91475baee5a2_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:a3c91540f20f094fee24224bce21018aa671849e7f75aece1bddfb6c945289d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:0b03429102eea10cc0733872bbc946bbfa378966b5d62e32762bd7a59c23e9de_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:44e5c0c8674682d03d564fef5e9f668d4ab71e6f27a64ee1bd7a2cf0c47d0db1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:8422d2c6e47dbb14bc80b03734fd702c57724bf384557e9b9e1a67b85e6b8185_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:b95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:661171f5a869f110ada60973b2c8289d80df4e7e7373e13bdb68bd5f59be91ea_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:9c1f70be52ba4c49de28376802bf2d73fe0a3bc44282ace7606cfb123233da4c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:ced6dbca20663462d35a97ca21836503e9987f29d37896ce8c5fb89650268762_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:e374c0aad61fb4a2af3dd0e8310286e45e283dac47c8e766f34cabf1d8cc2563_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:27f2b11d9017cad3af4f872ce382b54492bae329c499f4423c6ef7342522f844_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:371f8ec4475c9af90dbaf1a76a6b1217e195d3c371b0903137df92e8733371db_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:568aee9b50f1b79b0d3edea5e5a4f877ad8fcfe6f3e81e6f3cf049774dfe4bc9_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:e20f2aa3083e6d4100b4a38df9b416ac8b0f6a475fffff9754437fe4697dbd94_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:7d16492d3d30bb614c6155b2a3de1a3cfcd55100c06078c96557831f9c19221c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:85f7963a86254181a79cd48a98130c4b0cd50abe6d704940dac5958ab9d11863_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:89a50676a19cc0187665f7c06ddd717a37df80c4b0eccb96447380b7ba2db663_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:e6d522327993a91ed50b12745b26db70b5f7b374bb015ef7165ef7c3b59529b4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:1052d9b0befb2fd315b445ed4ccca0490075fa82d2752f1507f3daba6476d87a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:5511144641603a3fc4c93ae9d7253ba2fccc55f8806913a4e08ec9f3b919d5c8_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:b8e2d11f40a5a29f0a3fc870dafd8ce6c72e8983f44d5084814b0cc56d410fe7_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:fd3eb25ba4e8baaf13bdebf9a5c70d20d79a642bccd808c8dfbec52b403a2608_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:1e8efca30bc8130a20834ee0dfeff80a62c4b129c2f849492a62f761a684d105_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:572430d7b231e93613667d049f11ad8c0570f9cda09b1a0d9c9367a31ada8d86_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:736ac64d54c2a12dc2234272862e5a52c283dca3273ed2c95cb73167bdc177fa_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:9c3a0cae8f0998134af791cf690fe6a42783f6caed795c62d67c57ebd849d983_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:2ad0563c640566cc6e55ae741b09cd353cdd8a343931596ed1ce93d49e076667_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:ba5349debff221eb5e47fac02f60c5d664a32b5cf53a654e3e983ef036acb263_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:cd373cc3574546fc2e48a58a3a7e90620494ccb24507337ef1d9a90aaf88d02d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:e448d52eede5096fdb44b6850905a71959e2f90db6fea1cdd17cca941959a9d8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:1136c984617f2a3c71a5b451c5de88f06245a9a9c83783c16a6938b6f7272f80_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:b7b9c35577b5a91539597fa90c6187e20cdbad70e8ddc55c8dc80058759be711_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:bdf691c5300034b0331daea8d92f942c3db66aa11fd726d977ae36fec1791695_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:cc46200f1bd3aa621f80fc5535c917318d50084eea265b22fe1b79871184d7bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:2d1bb2935a4c90bf9ca6b22a11a07fcaba002f2020d0ea15b82a7cf4df66713c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:5d1e7ef39de25f974949e49cbe325783e78071678e30bc3d2311710875dba2bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:8b7aa7f81955082085fbf1317ad5d747f4e19ce35c13f17c8f57eb810a1adbf7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:dc0ffee2f8c96c6ee22a2ddb06d14e08149561bab7b4195d08b59f628870af68_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4489ffd456a5d5704dccafc45b523f572f90307e57b8b353f8d8ce4c42706d4f_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4b6d6e9d9146d9834fb999ee2cbec8c56806d09bce1137bd3869fa125d064f10_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:93147af5126f419ac3fe2a0c95715b76299f27ff642483b2d14b89301367d056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:fea7a807792063cafdd6196fc68e8f7b693d7f123241c6bd64f4a00050f4a5ef_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:2eb424b36226bec87b5277eea7f5ff288409a49f99c3f60ab795bf39a07af7c1_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4974b49892263b43d379077d1d44ebf579e4da3700043a9c370e52359d852e7b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4cafcf98bfde7d9700ea55ef88c183fbf172da5d1bbc57c315df4f0d00591547_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:6f3a3fcf20935e6454baf90004604407c0e205b78d5accc10aefdb03fde0faf6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:3ec58884225aa63c85639cda97c4d7c57c7ca505c885e9a5bcbbe14bd6fc82c6_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:62fb9dd8ffc2b61de085d39ba2fb0a8192c3634a79b6cf4d9821fdc95efc1fe4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:cfb71cbaeaa7cfa8280e19f89132a8ba8fc2ea84dfb6654975c1176ee1cfac4c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:d23b6e3b510f387235b042dd3e658caab3a3af7386895a53f0967fd8bca77f80_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:2d2159059467f0f9f4eb6550d6fe1739193101d784a3098fce4f25b37f3753a7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:8839a8851cea3d34dd15274678b6f00a80394308197a877be5505f4af39b62cc_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:9133c95a0fefcec77396b1ec04b33024a0e1a3716658de9debeb92a5ffc47f31_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:c8bde9c9afc34300b7193a8b9ad1c103efd8945b350ab007d9ca6d515ac9c007_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:05094b109396ae9f2a5f346602051a7310000d08890540d1fdef3712455f51c0_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b00b82b23fbabbf3dceaca70c0bb583405ef105cbd21037dd992c2461368bd2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b222fa278dcff0824bc0340e27b6182ffc04506e54d99048f5c01c6bc604ad7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:cc032f7a173f50c51872ddbf9a9c17fa51b7fd91cb3e7b8aeba378c2725043de_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:244bd3fa3c960a9eee6d978fe9291d7b112daf2f5516840292fd0298acee5ac1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:aba46c2c0e3ab613120a479c75f9dde8c772e7ec24034886371665c5c6b2fa8d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:bb19a56cdf094216cc7a4398ce76d0e53081a6a1ce6a05af5951ac3099af84e0_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:f9c0e9e31a1aeddfefb4f24f7dd70971c1e32d6c4ac99745f81ea63afb526823_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T15:58:30+00:00",
"details": "For multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.14/html/clusters/cluster_mce_overview#mce-install-intro",
"product_ids": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:01a0a5b524624b960339e6d40bc92eaf666532b7905b8b79a31a0ad512336f20_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:4285f5036dcf7311bc378bbe350dc33759254999de205929de90a9d218d32f78_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:b2f27f77bcbb85c3a57d40c14928a3922877270f4748cb2d03abfc4300f1925c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:e5ca54ae610b6fdd062b22d68e04e8c9638a4afe9df3dee7316a09a4a50f929d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:47265159cef044b5a4086af6506b3ad570d0966d80a5dd0c69d391ced37e2572_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:a6dc13baffa1382bc1316588eba2e63cfc1630d059b3b9ab53dd53c98d135220_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d69051165ba4538e28097a2caa510ae3bab59223e473eb9286763a0c8e2137d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:e04fa41cee83d89a88fc68bc38aadaa69f9c9f30e9a95f19eba299647e5f99bc_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2571"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:bcf5e63aba5e78b6a41dadcf73b70dc9940380c232cc2931b5da3ddfe2ecf8fc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:cc10845b259f7ac1cae5b254e090d52fb9278c89d07b0b7d44a8f6f704ec6272_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:de69593578d899842a0e98781f9c3d58338ee0925fa0b6243aedbb569a64cd96_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/addon-manager-rhel9@sha256:e4e7e0b3fc069d4746f6584047f8b40cd774b2556f11c2cabb57923a44ef389d_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:10981e0c7a156dbfd3b8cec809c618773f3d7806a2a24c0fb1cda2e93ed6ae98_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:31f187246ac7da245c160b3afc5f1187d82cd2c039f85111a338165407d7d49d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:a498c21c46341a168e51b133e07cd390d7440c3d949ac4107cd829c5b30a4614_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/backplane-rhel9-operator@sha256:fd7b341a1e55aec25f6e3221f03d140561be81a230590907dd74fe1a021df006_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:0180391fe4bca530eb5678bf95922d10365b286279b966136b67bf8d83a9a18c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:4ea287235d5dbf2385f4d217690b54cd5ce56820735ae96d66ea03d86d4426c3_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:6eec1cff0d514e343599e9c3ca7b7aa2cbff307a28e45b19364a534be4f89dd1_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-bootstrap-rhel9@sha256:e9d1e97601e8eaea73943489e782482703310d2e8f22a9fa234b640fcacbe64b_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:7b5496adbf0b53964790dbb22c468161e6d873912eacd00b08b955c1314d52a8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:8d86d2d4ac2459d61a1e493603c9eb7a3f0d584ad53aca2af884bf8bb8b30e71_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:c39a384c11e5242dc4b25fdd32813b4ff408b188af76df03e9757796fbc7a001_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/capoa-control-plane-rhel9@sha256:e0137ca5fd87bc47473fc0fc4c619ea794fac6156d84f7f4fbc689fe3328640e_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:01a0a5b524624b960339e6d40bc92eaf666532b7905b8b79a31a0ad512336f20_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:4285f5036dcf7311bc378bbe350dc33759254999de205929de90a9d218d32f78_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:b2f27f77bcbb85c3a57d40c14928a3922877270f4748cb2d03abfc4300f1925c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9@sha256:e5ca54ae610b6fdd062b22d68e04e8c9638a4afe9df3dee7316a09a4a50f929d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:8f10940b7e9f69bb5f5bb40fb4575f24fc8a2f20916615d6af4eff36b0dc24b2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:9e4527837150c9054e9f5eb594d557fb4642b86f1dfd109897ea63b5ff5984dd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:adfeb1a43a5b626519d6c0aee7cd7986d5afd349a4fae37d0e8821667f7fc6d3_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9@sha256:d9fecb5eebf1127819cf7a3f2c2b63e050cab8864c51d4dbcad4d95921a9b698_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:0bf1c2e7d2204076757c8bbb922e11feacedcefff491bfabf481d4c27f310448_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:437680b6193c0cf77c28cb2124e01a33b7dd51063366c5781aeaf339a840b056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:cc587469525f61858f261cfbf862608aab1509bf3cf5c1e43aea63a19e579728_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9@sha256:e7dc46d30ae833d7924260391781b20ffc25693073e1a4b60266caa6bd725f90_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:0712ee64942be9d307a5d89d5333a968092a685fa71c88c7eabe1498e2e3a915_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:3b2358f82cbcf6406c86a1ec0f9ccf649dfea143797cd7d112be21c6adfdbf87_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:58d58f838d9fc2ed84635083a00725a47334ee03b8a4282000b69dedddd7a9bd_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9@sha256:a6950372d2ab44e865938a37f5c2dfdd55bf02cec1575353538dd28b016700f4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:2fdf436e71fee6739ae6fcd450007d76fc3fa43ba203a809f3337f22d9229bd5_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:60751156b9a51d18668dee969963569a998172b0577acaeaecff52970f3c0957_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:a86aa371b54e25d0b38ae06aea67577142b227bea31597493639ec0018391a4b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9@sha256:d0955c18fa4864e073bfb9a61b42261587fc2f5f1b2f29cd0b139be5373b578a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:5e2316240808f561c9ec5b04a57e41776b7efc9a26afa9ae10f7bf7693b30d97_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:63be8363c2915b782cd9fc6007b761bc6d3ac9f77bfc35fae1c55c00974058f7_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:84d99fc9411e1a8d409d8c6bcd345cfdfee5c5986d6489a2633ffc7d4ad496b4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/cluster-proxy-rhel9@sha256:a3f0cde47e922823ca537e0de8c7ddfed7422be5282e137e4db04d4e3c748104_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:2acf15b73b6db09469d53c6317088fc5f633f684f8421cc4a09f52d1056a2bb6_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a53abad37395ec507071b894e51a0086b063a1d1d27e4d029b2d3cfb51bc0d14_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:a9871b54bfa689489d578155adb5a483cab73e202c092619e116e71efb476c00_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9@sha256:bf6e25c9b7d66fb0c45c0ebdbbd0ee34b7a9e1cff1ac70128ee7e475812bfa7c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:4955d00cb76f1360a80679973e9d53fcf38a57e0220bc8a29728cd0360327972_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:684094906425b67784bb7f10a152cd15e354bd84a2a2d68178000122bd43794d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:8794c45c047ad41c71fbd788d35d493a9e4f78c947106391b0f67d3d572b2d06_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9@sha256:d0dbcb780c8782e3b1d6abda17255bc45ec4fb5d01e29e8cb3b91bfa0a46c55a_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:0a49a64e48aed198f1ead92cd6584bd8b62813dc2621489783b9a62469d7f9e6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:2c17ef74e6ec8ae3a02268e43d9018eefaafc4493f94de3a8ca6a6fc836be6a4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:40a5278bcc8e647aaf16ccca432c4d9bec67ec074569f192420bca529fdaf113_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/console-mce-rhel9@sha256:eafd28f0dd525e4c11b90d01e686ada9bb6ef9e9097e81608df8c04ed15d513b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:0f47ceec837a12497ee911279b0fba82481e72ee163670a8674630f948d39aba_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:32166ec828cbc58224e236a86bd7439464379272f473bcdcd2ec765f7081a5b7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:65c8b3770f82794d55d269a004948a8e2c54cbd99b09552b4cdb91475baee5a2_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/discovery-rhel9@sha256:a3c91540f20f094fee24224bce21018aa671849e7f75aece1bddfb6c945289d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:0b03429102eea10cc0733872bbc946bbfa378966b5d62e32762bd7a59c23e9de_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:44e5c0c8674682d03d564fef5e9f668d4ab71e6f27a64ee1bd7a2cf0c47d0db1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:8422d2c6e47dbb14bc80b03734fd702c57724bf384557e9b9e1a67b85e6b8185_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hive-rhel9@sha256:b95787f2a384f94f00c84e38c0bd263a9a0f7fff9ce0df5bbd1c265f6812cefb_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:661171f5a869f110ada60973b2c8289d80df4e7e7373e13bdb68bd5f59be91ea_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:9c1f70be52ba4c49de28376802bf2d73fe0a3bc44282ace7606cfb123233da4c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:ced6dbca20663462d35a97ca21836503e9987f29d37896ce8c5fb89650268762_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator@sha256:e374c0aad61fb4a2af3dd0e8310286e45e283dac47c8e766f34cabf1d8cc2563_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:27f2b11d9017cad3af4f872ce382b54492bae329c499f4423c6ef7342522f844_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:371f8ec4475c9af90dbaf1a76a6b1217e195d3c371b0903137df92e8733371db_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:568aee9b50f1b79b0d3edea5e5a4f877ad8fcfe6f3e81e6f3cf049774dfe4bc9_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-cli-rhel9@sha256:e20f2aa3083e6d4100b4a38df9b416ac8b0f6a475fffff9754437fe4697dbd94_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:7d16492d3d30bb614c6155b2a3de1a3cfcd55100c06078c96557831f9c19221c_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:85f7963a86254181a79cd48a98130c4b0cd50abe6d704940dac5958ab9d11863_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:89a50676a19cc0187665f7c06ddd717a37df80c4b0eccb96447380b7ba2db663_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/hypershift-rhel9-operator@sha256:e6d522327993a91ed50b12745b26db70b5f7b374bb015ef7165ef7c3b59529b4_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:1052d9b0befb2fd315b445ed4ccca0490075fa82d2752f1507f3daba6476d87a_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:5511144641603a3fc4c93ae9d7253ba2fccc55f8806913a4e08ec9f3b919d5c8_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:b8e2d11f40a5a29f0a3fc870dafd8ce6c72e8983f44d5084814b0cc56d410fe7_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/image-based-install-rhel9@sha256:fd3eb25ba4e8baaf13bdebf9a5c70d20d79a642bccd808c8dfbec52b403a2608_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:47265159cef044b5a4086af6506b3ad570d0966d80a5dd0c69d391ced37e2572_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:a6dc13baffa1382bc1316588eba2e63cfc1630d059b3b9ab53dd53c98d135220_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:d69051165ba4538e28097a2caa510ae3bab59223e473eb9286763a0c8e2137d2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9@sha256:e04fa41cee83d89a88fc68bc38aadaa69f9c9f30e9a95f19eba299647e5f99bc_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:1e8efca30bc8130a20834ee0dfeff80a62c4b129c2f849492a62f761a684d105_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:572430d7b231e93613667d049f11ad8c0570f9cda09b1a0d9c9367a31ada8d86_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:736ac64d54c2a12dc2234272862e5a52c283dca3273ed2c95cb73167bdc177fa_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9@sha256:9c3a0cae8f0998134af791cf690fe6a42783f6caed795c62d67c57ebd849d983_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:2ad0563c640566cc6e55ae741b09cd353cdd8a343931596ed1ce93d49e076667_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:ba5349debff221eb5e47fac02f60c5d664a32b5cf53a654e3e983ef036acb263_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:cd373cc3574546fc2e48a58a3a7e90620494ccb24507337ef1d9a90aaf88d02d_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9@sha256:e448d52eede5096fdb44b6850905a71959e2f90db6fea1cdd17cca941959a9d8_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:1136c984617f2a3c71a5b451c5de88f06245a9a9c83783c16a6938b6f7272f80_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:b7b9c35577b5a91539597fa90c6187e20cdbad70e8ddc55c8dc80058759be711_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:bdf691c5300034b0331daea8d92f942c3db66aa11fd726d977ae36fec1791695_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/mce-capi-webhook-config-rhel9@sha256:cc46200f1bd3aa621f80fc5535c917318d50084eea265b22fe1b79871184d7bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:2d1bb2935a4c90bf9ca6b22a11a07fcaba002f2020d0ea15b82a7cf4df66713c_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:5d1e7ef39de25f974949e49cbe325783e78071678e30bc3d2311710875dba2bb_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:8b7aa7f81955082085fbf1317ad5d747f4e19ce35c13f17c8f57eb810a1adbf7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/multicloud-manager-rhel9@sha256:dc0ffee2f8c96c6ee22a2ddb06d14e08149561bab7b4195d08b59f628870af68_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4489ffd456a5d5704dccafc45b523f572f90307e57b8b353f8d8ce4c42706d4f_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:4b6d6e9d9146d9834fb999ee2cbec8c56806d09bce1137bd3869fa125d064f10_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:93147af5126f419ac3fe2a0c95715b76299f27ff642483b2d14b89301367d056_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/must-gather-rhel9@sha256:fea7a807792063cafdd6196fc68e8f7b693d7f123241c6bd64f4a00050f4a5ef_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:2eb424b36226bec87b5277eea7f5ff288409a49f99c3f60ab795bf39a07af7c1_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4974b49892263b43d379077d1d44ebf579e4da3700043a9c370e52359d852e7b_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:4cafcf98bfde7d9700ea55ef88c183fbf172da5d1bbc57c315df4f0d00591547_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/placement-rhel9@sha256:6f3a3fcf20935e6454baf90004604407c0e205b78d5accc10aefdb03fde0faf6_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:3ec58884225aa63c85639cda97c4d7c57c7ca505c885e9a5bcbbe14bd6fc82c6_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:62fb9dd8ffc2b61de085d39ba2fb0a8192c3634a79b6cf4d9821fdc95efc1fe4_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:cfb71cbaeaa7cfa8280e19f89132a8ba8fc2ea84dfb6654975c1176ee1cfac4c_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9@sha256:d23b6e3b510f387235b042dd3e658caab3a3af7386895a53f0967fd8bca77f80_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:2d2159059467f0f9f4eb6550d6fe1739193101d784a3098fce4f25b37f3753a7_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:8839a8851cea3d34dd15274678b6f00a80394308197a877be5505f4af39b62cc_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:9133c95a0fefcec77396b1ec04b33024a0e1a3716658de9debeb92a5ffc47f31_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-operator-rhel9@sha256:c8bde9c9afc34300b7193a8b9ad1c103efd8945b350ab007d9ca6d515ac9c007_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:05094b109396ae9f2a5f346602051a7310000d08890540d1fdef3712455f51c0_amd64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b00b82b23fbabbf3dceaca70c0bb583405ef105cbd21037dd992c2461368bd2_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:1b222fa278dcff0824bc0340e27b6182ffc04506e54d99048f5c01c6bc604ad7_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/registration-rhel9@sha256:cc032f7a173f50c51872ddbf9a9c17fa51b7fd91cb3e7b8aeba378c2725043de_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:244bd3fa3c960a9eee6d978fe9291d7b112daf2f5516840292fd0298acee5ac1_arm64",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:aba46c2c0e3ab613120a479c75f9dde8c772e7ec24034886371665c5c6b2fa8d_ppc64le",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:bb19a56cdf094216cc7a4398ce76d0e53081a6a1ce6a05af5951ac3099af84e0_s390x",
"multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/work-rhel9@sha256:f9c0e9e31a1aeddfefb4f24f7dd70971c1e32d6c4ac99745f81ea63afb526823_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:2146
Vulnerability from csaf_redhat - Published: 2026-02-05 15:54 - Updated: 2026-02-13 23:28Summary
Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release
Notes
Topic
The 1.3.2 release of Red Hat Trusted Artifact Signer OpenShift Operator.
For more details please visit the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3
Details
The RHTAS Operator can be used with OpenShift Container Platform 4.16, 4.17, 4.18, 4.19, and 4.20
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The 1.3.2 release of Red Hat Trusted Artifact Signer OpenShift Operator.\nFor more details please visit the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3",
"title": "Topic"
},
{
"category": "general",
"text": "The RHTAS Operator can be used with OpenShift Container Platform 4.16, 4.17, 4.18, 4.19, and 4.20",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2146",
"url": "https://access.redhat.com/errata/RHSA-2026:2146"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3",
"url": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2146.json"
}
],
"title": "Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release",
"tracking": {
"current_release_date": "2026-02-13T23:28:31+00:00",
"generator": {
"date": "2026-02-13T23:28:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2146",
"initial_release_date": "2026-02-05T15:54:06+00:00",
"revision_history": [
{
"date": "2026-02-05T15:54:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-05T15:54:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-13T23:28:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Trusted Artifact Signer 1.3",
"product": {
"name": "Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:trusted_artifact_signer:1.3::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Trusted Artifact Signer"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/rhtas-operator-bundle@sha256:3fedef0ee6c83c4a9b37ada2d183acf6f3e13b01ffa55c307ed7243d2fcb944c_amd64",
"product": {
"name": "registry.redhat.io/rhtas/rhtas-operator-bundle@sha256:3fedef0ee6c83c4a9b37ada2d183acf6f3e13b01ffa55c307ed7243d2fcb944c_amd64",
"product_id": "registry.redhat.io/rhtas/rhtas-operator-bundle@sha256:3fedef0ee6c83c4a9b37ada2d183acf6f3e13b01ffa55c307ed7243d2fcb944c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhtas-operator-bundle@sha256%3A3fedef0ee6c83c4a9b37ada2d183acf6f3e13b01ffa55c307ed7243d2fcb944c?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770117502"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:f46ea66470e6f90a3a180dd2b41a00ff80881b4089213f10bf23bb3d638d8d3d_amd64",
"product": {
"name": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:f46ea66470e6f90a3a180dd2b41a00ff80881b4089213f10bf23bb3d638d8d3d_amd64",
"product_id": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:f46ea66470e6f90a3a180dd2b41a00ff80881b4089213f10bf23bb3d638d8d3d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhtas-rhel9-operator@sha256%3Af46ea66470e6f90a3a180dd2b41a00ff80881b4089213f10bf23bb3d638d8d3d?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1770117502"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/rhtas-operator-bundle@sha256:3fedef0ee6c83c4a9b37ada2d183acf6f3e13b01ffa55c307ed7243d2fcb944c_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rhtas-operator-bundle@sha256:3fedef0ee6c83c4a9b37ada2d183acf6f3e13b01ffa55c307ed7243d2fcb944c_amd64"
},
"product_reference": "registry.redhat.io/rhtas/rhtas-operator-bundle@sha256:3fedef0ee6c83c4a9b37ada2d183acf6f3e13b01ffa55c307ed7243d2fcb944c_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:f46ea66470e6f90a3a180dd2b41a00ff80881b4089213f10bf23bb3d638d8d3d_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:f46ea66470e6f90a3a180dd2b41a00ff80881b4089213f10bf23bb3d638d8d3d_amd64"
},
"product_reference": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:f46ea66470e6f90a3a180dd2b41a00ff80881b4089213f10bf23bb3d638d8d3d_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rhtas-operator-bundle@sha256:3fedef0ee6c83c4a9b37ada2d183acf6f3e13b01ffa55c307ed7243d2fcb944c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:f46ea66470e6f90a3a180dd2b41a00ff80881b4089213f10bf23bb3d638d8d3d_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rhtas-operator-bundle@sha256:3fedef0ee6c83c4a9b37ada2d183acf6f3e13b01ffa55c307ed7243d2fcb944c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T15:54:06+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:f46ea66470e6f90a3a180dd2b41a00ff80881b4089213f10bf23bb3d638d8d3d_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2146"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rhtas-operator-bundle@sha256:3fedef0ee6c83c4a9b37ada2d183acf6f3e13b01ffa55c307ed7243d2fcb944c_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:f46ea66470e6f90a3a180dd2b41a00ff80881b4089213f10bf23bb3d638d8d3d_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
}
]
}
RHSA-2026:1506
Vulnerability from csaf_redhat - Published: 2026-01-28 17:34 - Updated: 2026-02-13 23:28Summary
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update
Notes
Topic
An update is now available for Red Hat Ansible Automation Platform 2.5
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language.
Security Fix(es):
* automation-controller: urllib3 Streaming API improperly handles highly compressed data (CVE-2025-66471)
* automation controller: AIOHTTP's HTTP Parser auto_decompress feature is vulnerable to zip bomb (CVE-2025-69223)
* automation-controller: Django: algorithmic complexity in XML Deserializer leads to denial of service (CVE-2025-64460)
* automation-controller: AIOHTTP HTTP Request/Response Smuggling (CVE-2025-53643)
* python3.11-django: Django: Algorithmic complexity in XML Deserializer leads to denial of service (CVE-2025-64460)
* python3.11-urllib3: urllib3 Streaming API improperly handles highly compressed data (CVE-2025-66471)
* receptor: Excessive resource consumption when printing error string for host certificate validation in crypto/x509 (CVE-2025-61729)
Updates and fixes included:
* ansible-core has been updated to 2.16.15
* ansible-dev-tools has been updated to 26.1.0
* ansible-lint has been updated to 26.1.0
* ansible-navigator has been updated to 26.1.1
* automation-controller has been updated to 4.6.25
* automation-gateway has been updated to 2.5.20260121
* automation-hub has been updated to 4.10.11
* python3.11-botocore has been updated to 1.34.162
* python3.11-django has been updated to 4.2.27
* python3.11-galaxy-importer has been updated to 0.4.37
* python3.11-galaxy-ng has been updated to 4.10.11
* python3.11-requests has been updated to 2.31.0
* python3.11-urllib3 has been updated to 2.6.3
* receptor has been updated to 1.6.3
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Ansible Automation Platform 2.5\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language.\n\nSecurity Fix(es):\n* automation-controller: urllib3 Streaming API improperly handles highly compressed data (CVE-2025-66471)\n* automation controller: AIOHTTP\u0027s HTTP Parser auto_decompress feature is vulnerable to zip bomb (CVE-2025-69223)\n* automation-controller: Django: algorithmic complexity in XML Deserializer leads to denial of service (CVE-2025-64460)\n* automation-controller: AIOHTTP HTTP Request/Response Smuggling (CVE-2025-53643)\n* python3.11-django: Django: Algorithmic complexity in XML Deserializer leads to denial of service (CVE-2025-64460)\n* python3.11-urllib3: urllib3 Streaming API improperly handles highly compressed data (CVE-2025-66471)\n* receptor: Excessive resource consumption when printing error string for host certificate validation in crypto/x509 (CVE-2025-61729)\n\nUpdates and fixes included:\n* ansible-core has been updated to 2.16.15\n* ansible-dev-tools has been updated to 26.1.0\n* ansible-lint has been updated to 26.1.0\n* ansible-navigator has been updated to 26.1.1\n* automation-controller has been updated to 4.6.25\n* automation-gateway has been updated to 2.5.20260121\n* automation-hub has been updated to 4.10.11\n* python3.11-botocore has been updated to 1.34.162\n* python3.11-django has been updated to 4.2.27\n* python3.11-galaxy-importer has been updated to 0.4.37\n* python3.11-galaxy-ng has been updated to 4.10.11\n* python3.11-requests has been updated to 2.31.0\n* python3.11-urllib3 has been updated to 2.6.3\n* receptor has been updated to 1.6.3",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1506",
"url": "https://access.redhat.com/errata/RHSA-2026:1506"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.5/html/release_notes/patch_releases",
"url": "https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.5/html/release_notes/patch_releases"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.5#Upgrading",
"url": "https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.5#Upgrading"
},
{
"category": "external",
"summary": "2380000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380000"
},
{
"category": "external",
"summary": "2418366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418366"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "2427456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427456"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1506.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update",
"tracking": {
"current_release_date": "2026-02-13T23:28:12+00:00",
"generator": {
"date": "2026-02-13T23:28:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1506",
"initial_release_date": "2026-01-28T17:34:52+00:00",
"revision_history": [
{
"date": "2026-01-28T17:34:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-28T17:34:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-13T23:28:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product": {
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform:2.5::el9"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product": {
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform_developer:2.5::el9"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product": {
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform_inside:2.5::el9"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product": {
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform:2.5::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product": {
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform_developer:2.5::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product": {
"name": "Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform_inside:2.5::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Ansible Automation Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-botocore-0:1.34.162-1.el9ap.src",
"product": {
"name": "python3.11-botocore-0:1.34.162-1.el9ap.src",
"product_id": "python3.11-botocore-0:1.34.162-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-botocore@1.34.162-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-django-0:4.2.27-1.el9ap.src",
"product": {
"name": "python3.11-django-0:4.2.27-1.el9ap.src",
"product_id": "python3.11-django-0:4.2.27-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django@4.2.27-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-requests-0:2.31.0-3.el9ap.src",
"product": {
"name": "python3.11-requests-0:2.31.0-3.el9ap.src",
"product_id": "python3.11-requests-0:2.31.0-3.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-requests@2.31.0-3.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.src",
"product": {
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.src",
"product_id": "python3.11-urllib3-0:2.6.3-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@2.6.3-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-lint-0:26.1.0-1.el9ap.src",
"product": {
"name": "ansible-lint-0:26.1.0-1.el9ap.src",
"product_id": "ansible-lint-0:26.1.0-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-lint@26.1.0-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-core-1:2.16.15-1.el9ap.src",
"product": {
"name": "ansible-core-1:2.16.15-1.el9ap.src",
"product_id": "ansible-core-1:2.16.15-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-core@2.16.15-1.el9ap?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el9ap.src",
"product": {
"name": "receptor-0:1.6.3-1.el9ap.src",
"product_id": "receptor-0:1.6.3-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-navigator-0:26.1.1-1.el9ap.src",
"product": {
"name": "ansible-navigator-0:26.1.1-1.el9ap.src",
"product_id": "ansible-navigator-0:26.1.1-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-navigator@26.1.1-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-dev-tools-0:26.1.0-1.el9ap.src",
"product": {
"name": "ansible-dev-tools-0:26.1.0-1.el9ap.src",
"product_id": "ansible-dev-tools-0:26.1.0-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-dev-tools@26.1.0-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "automation-gateway-0:2.5.20260121-1.el9ap.src",
"product": {
"name": "automation-gateway-0:2.5.20260121-1.el9ap.src",
"product_id": "automation-gateway-0:2.5.20260121-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-gateway@2.5.20260121-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.6.25-1.el9ap.src",
"product": {
"name": "automation-controller-0:4.6.25-1.el9ap.src",
"product_id": "automation-controller-0:4.6.25-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.6.25-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"product": {
"name": "python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"product_id": "python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-galaxy-ng@4.10.11-2.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"product": {
"name": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"product_id": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-galaxy-importer@0.4.37-2.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "automation-hub-0:4.10.11-1.el9ap.src",
"product": {
"name": "automation-hub-0:4.10.11-1.el9ap.src",
"product_id": "automation-hub-0:4.10.11-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-hub@4.10.11-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-botocore-0:1.34.162-1.el8ap.src",
"product": {
"name": "python3.11-botocore-0:1.34.162-1.el8ap.src",
"product_id": "python3.11-botocore-0:1.34.162-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-botocore@1.34.162-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-django-0:4.2.27-1.el8ap.src",
"product": {
"name": "python3.11-django-0:4.2.27-1.el8ap.src",
"product_id": "python3.11-django-0:4.2.27-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django@4.2.27-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-requests-0:2.31.0-3.el8ap.src",
"product": {
"name": "python3.11-requests-0:2.31.0-3.el8ap.src",
"product_id": "python3.11-requests-0:2.31.0-3.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-requests@2.31.0-3.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-urllib3-0:2.6.3-1.el8ap.src",
"product": {
"name": "python3.11-urllib3-0:2.6.3-1.el8ap.src",
"product_id": "python3.11-urllib3-0:2.6.3-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@2.6.3-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-navigator-0:26.1.1-1.el8ap.src",
"product": {
"name": "ansible-navigator-0:26.1.1-1.el8ap.src",
"product_id": "ansible-navigator-0:26.1.1-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-navigator@26.1.1-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-dev-tools-0:26.1.0-1.el8ap.src",
"product": {
"name": "ansible-dev-tools-0:26.1.0-1.el8ap.src",
"product_id": "ansible-dev-tools-0:26.1.0-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-dev-tools@26.1.0-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-core-1:2.16.15-1.el8ap.src",
"product": {
"name": "ansible-core-1:2.16.15-1.el8ap.src",
"product_id": "ansible-core-1:2.16.15-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-core@2.16.15-1.el8ap?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "automation-gateway-0:2.5.20260121-1.el8ap.src",
"product": {
"name": "automation-gateway-0:2.5.20260121-1.el8ap.src",
"product_id": "automation-gateway-0:2.5.20260121-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-gateway@2.5.20260121-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el8ap.src",
"product": {
"name": "receptor-0:1.6.3-1.el8ap.src",
"product_id": "receptor-0:1.6.3-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-lint-0:26.1.0-1.el8ap.src",
"product": {
"name": "ansible-lint-0:26.1.0-1.el8ap.src",
"product_id": "ansible-lint-0:26.1.0-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-lint@26.1.0-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.6.25-1.el8ap.src",
"product": {
"name": "automation-controller-0:4.6.25-1.el8ap.src",
"product_id": "automation-controller-0:4.6.25-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.6.25-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"product": {
"name": "python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"product_id": "python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-galaxy-ng@4.10.11-2.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"product": {
"name": "python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"product_id": "python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-galaxy-importer@0.4.37-2.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "automation-hub-0:4.10.11-1.el8ap.src",
"product": {
"name": "automation-hub-0:4.10.11-1.el8ap.src",
"product_id": "automation-hub-0:4.10.11-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-hub@4.10.11-1.el8ap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"product": {
"name": "python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"product_id": "python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-botocore@1.34.162-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-django-0:4.2.27-1.el9ap.noarch",
"product": {
"name": "python3.11-django-0:4.2.27-1.el9ap.noarch",
"product_id": "python3.11-django-0:4.2.27-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django@4.2.27-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-requests-0:2.31.0-3.el9ap.noarch",
"product": {
"name": "python3.11-requests-0:2.31.0-3.el9ap.noarch",
"product_id": "python3.11-requests-0:2.31.0-3.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-requests@2.31.0-3.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"product": {
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"product_id": "python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@2.6.3-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-lint-0:26.1.0-1.el9ap.noarch",
"product": {
"name": "ansible-lint-0:26.1.0-1.el9ap.noarch",
"product_id": "ansible-lint-0:26.1.0-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-lint@26.1.0-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-core-1:2.16.15-1.el9ap.noarch",
"product": {
"name": "ansible-core-1:2.16.15-1.el9ap.noarch",
"product_id": "ansible-core-1:2.16.15-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-core@2.16.15-1.el9ap?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "ansible-test-1:2.16.15-1.el9ap.noarch",
"product": {
"name": "ansible-test-1:2.16.15-1.el9ap.noarch",
"product_id": "ansible-test-1:2.16.15-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-test@2.16.15-1.el9ap?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "receptorctl-0:1.6.3-1.el9ap.noarch",
"product": {
"name": "receptorctl-0:1.6.3-1.el9ap.noarch",
"product_id": "receptorctl-0:1.6.3-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptorctl@1.6.3-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-navigator-0:26.1.1-1.el9ap.noarch",
"product": {
"name": "ansible-navigator-0:26.1.1-1.el9ap.noarch",
"product_id": "ansible-navigator-0:26.1.1-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-navigator@26.1.1-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"product": {
"name": "ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"product_id": "ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-dev-tools%2Bserver@26.1.0-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"product": {
"name": "ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"product_id": "ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-dev-tools@26.1.0-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"product": {
"name": "automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"product_id": "automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-gateway@2.5.20260121-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"product": {
"name": "automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"product_id": "automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-gateway-config@2.5.20260121-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"product": {
"name": "automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"product_id": "automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-gateway-server@2.5.20260121-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"product": {
"name": "automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"product_id": "automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-cli@4.6.25-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-server-0:4.6.25-1.el9ap.noarch",
"product": {
"name": "automation-controller-server-0:4.6.25-1.el9ap.noarch",
"product_id": "automation-controller-server-0:4.6.25-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-server@4.6.25-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"product": {
"name": "automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"product_id": "automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-ui@4.6.25-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"product": {
"name": "python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"product_id": "python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-galaxy-ng@4.10.11-2.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"product": {
"name": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"product_id": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-galaxy-importer@0.4.37-2.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-hub-0:4.10.11-1.el9ap.noarch",
"product": {
"name": "automation-hub-0:4.10.11-1.el9ap.noarch",
"product_id": "automation-hub-0:4.10.11-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-hub@4.10.11-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"product": {
"name": "python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"product_id": "python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-botocore@1.34.162-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-django-0:4.2.27-1.el8ap.noarch",
"product": {
"name": "python3.11-django-0:4.2.27-1.el8ap.noarch",
"product_id": "python3.11-django-0:4.2.27-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-django@4.2.27-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-requests-0:2.31.0-3.el8ap.noarch",
"product": {
"name": "python3.11-requests-0:2.31.0-3.el8ap.noarch",
"product_id": "python3.11-requests-0:2.31.0-3.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-requests@2.31.0-3.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"product": {
"name": "python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"product_id": "python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@2.6.3-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-navigator-0:26.1.1-1.el8ap.noarch",
"product": {
"name": "ansible-navigator-0:26.1.1-1.el8ap.noarch",
"product_id": "ansible-navigator-0:26.1.1-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-navigator@26.1.1-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"product": {
"name": "ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"product_id": "ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-dev-tools%2Bserver@26.1.0-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"product": {
"name": "ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"product_id": "ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-dev-tools@26.1.0-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-core-1:2.16.15-1.el8ap.noarch",
"product": {
"name": "ansible-core-1:2.16.15-1.el8ap.noarch",
"product_id": "ansible-core-1:2.16.15-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-core@2.16.15-1.el8ap?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "ansible-test-1:2.16.15-1.el8ap.noarch",
"product": {
"name": "ansible-test-1:2.16.15-1.el8ap.noarch",
"product_id": "ansible-test-1:2.16.15-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-test@2.16.15-1.el8ap?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"product": {
"name": "automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"product_id": "automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-gateway@2.5.20260121-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"product": {
"name": "automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"product_id": "automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-gateway-config@2.5.20260121-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"product": {
"name": "automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"product_id": "automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-gateway-server@2.5.20260121-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "receptorctl-0:1.6.3-1.el8ap.noarch",
"product": {
"name": "receptorctl-0:1.6.3-1.el8ap.noarch",
"product_id": "receptorctl-0:1.6.3-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptorctl@1.6.3-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-lint-0:26.1.0-1.el8ap.noarch",
"product": {
"name": "ansible-lint-0:26.1.0-1.el8ap.noarch",
"product_id": "ansible-lint-0:26.1.0-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-lint@26.1.0-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"product": {
"name": "automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"product_id": "automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-cli@4.6.25-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-server-0:4.6.25-1.el8ap.noarch",
"product": {
"name": "automation-controller-server-0:4.6.25-1.el8ap.noarch",
"product_id": "automation-controller-server-0:4.6.25-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-server@4.6.25-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"product": {
"name": "automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"product_id": "automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-ui@4.6.25-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"product": {
"name": "python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"product_id": "python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-galaxy-ng@4.10.11-2.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"product": {
"name": "python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"product_id": "python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-galaxy-importer@0.4.37-2.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-hub-0:4.10.11-1.el8ap.noarch",
"product": {
"name": "automation-hub-0:4.10.11-1.el8ap.noarch",
"product_id": "automation-hub-0:4.10.11-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-hub@4.10.11-1.el8ap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el9ap.x86_64",
"product": {
"name": "receptor-0:1.6.3-1.el9ap.x86_64",
"product_id": "receptor-0:1.6.3-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"product_id": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"product_id": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.6.25-1.el9ap.x86_64",
"product": {
"name": "automation-controller-0:4.6.25-1.el9ap.x86_64",
"product_id": "automation-controller-0:4.6.25-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.6.25-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"product": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"product_id": "automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.6.25-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el8ap.x86_64",
"product": {
"name": "receptor-0:1.6.3-1.el8ap.x86_64",
"product_id": "receptor-0:1.6.3-1.el8ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el8ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"product_id": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el8ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"product_id": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el8ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.6.25-1.el8ap.x86_64",
"product": {
"name": "automation-controller-0:4.6.25-1.el8ap.x86_64",
"product_id": "automation-controller-0:4.6.25-1.el8ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.6.25-1.el8ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"product": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"product_id": "automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.6.25-1.el8ap?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el9ap.ppc64le",
"product": {
"name": "receptor-0:1.6.3-1.el9ap.ppc64le",
"product_id": "receptor-0:1.6.3-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"product_id": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"product_id": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.6.25-1.el9ap.ppc64le",
"product": {
"name": "automation-controller-0:4.6.25-1.el9ap.ppc64le",
"product_id": "automation-controller-0:4.6.25-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.6.25-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"product": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"product_id": "automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.6.25-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el8ap.ppc64le",
"product": {
"name": "receptor-0:1.6.3-1.el8ap.ppc64le",
"product_id": "receptor-0:1.6.3-1.el8ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el8ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"product_id": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el8ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"product_id": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el8ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.6.25-1.el8ap.ppc64le",
"product": {
"name": "automation-controller-0:4.6.25-1.el8ap.ppc64le",
"product_id": "automation-controller-0:4.6.25-1.el8ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.6.25-1.el8ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"product": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"product_id": "automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.6.25-1.el8ap?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el9ap.s390x",
"product": {
"name": "receptor-0:1.6.3-1.el9ap.s390x",
"product_id": "receptor-0:1.6.3-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"product_id": "receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"product_id": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.6.25-1.el9ap.s390x",
"product": {
"name": "automation-controller-0:4.6.25-1.el9ap.s390x",
"product_id": "automation-controller-0:4.6.25-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.6.25-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"product": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"product_id": "automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.6.25-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el8ap.s390x",
"product": {
"name": "receptor-0:1.6.3-1.el8ap.s390x",
"product_id": "receptor-0:1.6.3-1.el8ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el8ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"product_id": "receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el8ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"product_id": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el8ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.6.25-1.el8ap.s390x",
"product": {
"name": "automation-controller-0:4.6.25-1.el8ap.s390x",
"product_id": "automation-controller-0:4.6.25-1.el8ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.6.25-1.el8ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"product": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"product_id": "automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.6.25-1.el8ap?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el9ap.aarch64",
"product": {
"name": "receptor-0:1.6.3-1.el9ap.aarch64",
"product_id": "receptor-0:1.6.3-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"product_id": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"product_id": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.6.25-1.el9ap.aarch64",
"product": {
"name": "automation-controller-0:4.6.25-1.el9ap.aarch64",
"product_id": "automation-controller-0:4.6.25-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.6.25-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"product": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"product_id": "automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.6.25-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-0:1.6.3-1.el8ap.aarch64",
"product": {
"name": "receptor-0:1.6.3-1.el8ap.aarch64",
"product_id": "receptor-0:1.6.3-1.el8ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor@1.6.3-1.el8ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"product": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"product_id": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debugsource@1.6.3-1.el8ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"product": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"product_id": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/receptor-debuginfo@1.6.3-1.el8ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.6.25-1.el8ap.aarch64",
"product": {
"name": "automation-controller-0:4.6.25-1.el8ap.aarch64",
"product_id": "automation-controller-0:4.6.25-1.el8ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.6.25-1.el8ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"product": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"product_id": "automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.6.25-1.el8ap?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch"
},
"product_reference": "ansible-core-1:2.16.15-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src"
},
"product_reference": "ansible-core-1:2.16.15-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch"
},
"product_reference": "ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch"
},
"product_reference": "ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src"
},
"product_reference": "ansible-dev-tools-0:26.1.0-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch"
},
"product_reference": "ansible-lint-0:26.1.0-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src"
},
"product_reference": "ansible-lint-0:26.1.0-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-1:2.16.15-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch"
},
"product_reference": "ansible-test-1:2.16.15-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64"
},
"product_reference": "automation-controller-0:4.6.25-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le"
},
"product_reference": "automation-controller-0:4.6.25-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x"
},
"product_reference": "automation-controller-0:4.6.25-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src"
},
"product_reference": "automation-controller-0:4.6.25-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64"
},
"product_reference": "automation-controller-0:4.6.25-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-cli-0:4.6.25-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch"
},
"product_reference": "automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-server-0:4.6.25-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch"
},
"product_reference": "automation-controller-server-0:4.6.25-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-ui-0:4.6.25-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch"
},
"product_reference": "automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-0:4.2.27-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch"
},
"product_reference": "python3.11-django-0:4.2.27-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-0:4.2.27-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src"
},
"product_reference": "python3.11-django-0:4.2.27-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-requests-0:2.31.0-3.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch"
},
"product_reference": "python3.11-requests-0:2.31.0-3.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-requests-0:2.31.0-3.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src"
},
"product_reference": "python3.11-requests-0:2.31.0-3.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:2.6.3-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch"
},
"product_reference": "python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:2.6.3-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src"
},
"product_reference": "python3.11-urllib3-0:2.6.3-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch"
},
"product_reference": "ansible-core-1:2.16.15-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src"
},
"product_reference": "ansible-core-1:2.16.15-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch"
},
"product_reference": "ansible-lint-0:26.1.0-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src"
},
"product_reference": "ansible-lint-0:26.1.0-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-1:2.16.15-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch"
},
"product_reference": "ansible-test-1:2.16.15-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch"
},
"product_reference": "ansible-core-1:2.16.15-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src"
},
"product_reference": "ansible-core-1:2.16.15-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch"
},
"product_reference": "ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch"
},
"product_reference": "ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src"
},
"product_reference": "ansible-dev-tools-0:26.1.0-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch"
},
"product_reference": "ansible-lint-0:26.1.0-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src"
},
"product_reference": "ansible-lint-0:26.1.0-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-1:2.16.15-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch"
},
"product_reference": "ansible-test-1:2.16.15-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64"
},
"product_reference": "automation-controller-0:4.6.25-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le"
},
"product_reference": "automation-controller-0:4.6.25-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x"
},
"product_reference": "automation-controller-0:4.6.25-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src"
},
"product_reference": "automation-controller-0:4.6.25-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64"
},
"product_reference": "automation-controller-0:4.6.25-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-cli-0:4.6.25-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch"
},
"product_reference": "automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-server-0:4.6.25-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch"
},
"product_reference": "automation-controller-server-0:4.6.25-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-ui-0:4.6.25-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch"
},
"product_reference": "automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-gateway-0:2.5.20260121-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch"
},
"product_reference": "automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-gateway-0:2.5.20260121-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src"
},
"product_reference": "automation-gateway-0:2.5.20260121-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-gateway-config-0:2.5.20260121-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch"
},
"product_reference": "automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-gateway-server-0:2.5.20260121-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch"
},
"product_reference": "automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-hub-0:4.10.11-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch"
},
"product_reference": "automation-hub-0:4.10.11-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-hub-0:4.10.11-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src"
},
"product_reference": "automation-hub-0:4.10.11-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-botocore-0:1.34.162-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch"
},
"product_reference": "python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-botocore-0:1.34.162-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src"
},
"product_reference": "python3.11-botocore-0:1.34.162-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-0:4.2.27-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch"
},
"product_reference": "python3.11-django-0:4.2.27-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-0:4.2.27-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src"
},
"product_reference": "python3.11-django-0:4.2.27-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch"
},
"product_reference": "python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-galaxy-importer-0:0.4.37-2.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src"
},
"product_reference": "python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch"
},
"product_reference": "python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-galaxy-ng-0:4.10.11-2.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src"
},
"product_reference": "python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-requests-0:2.31.0-3.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch"
},
"product_reference": "python3.11-requests-0:2.31.0-3.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-requests-0:2.31.0-3.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src"
},
"product_reference": "python3.11-requests-0:2.31.0-3.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:2.6.3-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch"
},
"product_reference": "python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:2.6.3-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src"
},
"product_reference": "python3.11-urllib3-0:2.6.3-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch"
},
"product_reference": "ansible-core-1:2.16.15-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src"
},
"product_reference": "ansible-core-1:2.16.15-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch"
},
"product_reference": "ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch"
},
"product_reference": "ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src"
},
"product_reference": "ansible-dev-tools-0:26.1.0-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch"
},
"product_reference": "ansible-lint-0:26.1.0-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src"
},
"product_reference": "ansible-lint-0:26.1.0-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-1:2.16.15-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch"
},
"product_reference": "ansible-test-1:2.16.15-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64"
},
"product_reference": "automation-controller-0:4.6.25-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le"
},
"product_reference": "automation-controller-0:4.6.25-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x"
},
"product_reference": "automation-controller-0:4.6.25-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src"
},
"product_reference": "automation-controller-0:4.6.25-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64"
},
"product_reference": "automation-controller-0:4.6.25-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-cli-0:4.6.25-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch"
},
"product_reference": "automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-server-0:4.6.25-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch"
},
"product_reference": "automation-controller-server-0:4.6.25-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-ui-0:4.6.25-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch"
},
"product_reference": "automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-0:4.2.27-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch"
},
"product_reference": "python3.11-django-0:4.2.27-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-0:4.2.27-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src"
},
"product_reference": "python3.11-django-0:4.2.27-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-requests-0:2.31.0-3.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch"
},
"product_reference": "python3.11-requests-0:2.31.0-3.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-requests-0:2.31.0-3.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src"
},
"product_reference": "python3.11-requests-0:2.31.0-3.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch"
},
"product_reference": "python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src"
},
"product_reference": "python3.11-urllib3-0:2.6.3-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Developer-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch"
},
"product_reference": "ansible-core-1:2.16.15-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src"
},
"product_reference": "ansible-core-1:2.16.15-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch"
},
"product_reference": "ansible-lint-0:26.1.0-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src"
},
"product_reference": "ansible-lint-0:26.1.0-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-1:2.16.15-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch"
},
"product_reference": "ansible-test-1:2.16.15-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5-Inside-1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch"
},
"product_reference": "ansible-core-1:2.16.15-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.16.15-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src"
},
"product_reference": "ansible-core-1:2.16.15-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch"
},
"product_reference": "ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch"
},
"product_reference": "ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-dev-tools-0:26.1.0-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src"
},
"product_reference": "ansible-dev-tools-0:26.1.0-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch"
},
"product_reference": "ansible-lint-0:26.1.0-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-lint-0:26.1.0-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src"
},
"product_reference": "ansible-lint-0:26.1.0-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-navigator-0:26.1.1-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src"
},
"product_reference": "ansible-navigator-0:26.1.1-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-1:2.16.15-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch"
},
"product_reference": "ansible-test-1:2.16.15-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64"
},
"product_reference": "automation-controller-0:4.6.25-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le"
},
"product_reference": "automation-controller-0:4.6.25-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x"
},
"product_reference": "automation-controller-0:4.6.25-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src"
},
"product_reference": "automation-controller-0:4.6.25-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.6.25-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64"
},
"product_reference": "automation-controller-0:4.6.25-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-cli-0:4.6.25-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch"
},
"product_reference": "automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-server-0:4.6.25-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch"
},
"product_reference": "automation-controller-server-0:4.6.25-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-ui-0:4.6.25-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch"
},
"product_reference": "automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64"
},
"product_reference": "automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-gateway-0:2.5.20260121-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch"
},
"product_reference": "automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-gateway-0:2.5.20260121-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src"
},
"product_reference": "automation-gateway-0:2.5.20260121-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-gateway-config-0:2.5.20260121-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch"
},
"product_reference": "automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-gateway-server-0:2.5.20260121-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch"
},
"product_reference": "automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-hub-0:4.10.11-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch"
},
"product_reference": "automation-hub-0:4.10.11-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-hub-0:4.10.11-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src"
},
"product_reference": "automation-hub-0:4.10.11-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-botocore-0:1.34.162-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch"
},
"product_reference": "python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-botocore-0:1.34.162-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src"
},
"product_reference": "python3.11-botocore-0:1.34.162-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-0:4.2.27-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch"
},
"product_reference": "python3.11-django-0:4.2.27-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-django-0:4.2.27-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src"
},
"product_reference": "python3.11-django-0:4.2.27-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch"
},
"product_reference": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src"
},
"product_reference": "python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch"
},
"product_reference": "python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-galaxy-ng-0:4.10.11-2.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src"
},
"product_reference": "python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-requests-0:2.31.0-3.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch"
},
"product_reference": "python3.11-requests-0:2.31.0-3.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-requests-0:2.31.0-3.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src"
},
"product_reference": "python3.11-requests-0:2.31.0-3.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch"
},
"product_reference": "python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:2.6.3-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src"
},
"product_reference": "python3.11-urllib3-0:2.6.3-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64"
},
"product_reference": "receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "receptorctl-0:1.6.3-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.5 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
},
"product_reference": "receptorctl-0:1.6.3-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53643",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2025-07-14T21:00:57.122280+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380000"
}
],
"notes": [
{
"category": "description",
"text": "A request smuggling flaw was found in the aiohttp python library. If a pure Python version of aiohttp is installed, without the usual C extensions, for example, or if AIOHTTP_NO_EXTENSIONS is enabled, an attacker can execute a request smuggling attack to bypass certain firewalls or proxy protections.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "aiohttp: AIOHTTP HTTP Request/Response Smuggling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64"
],
"known_not_affected": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-53643"
},
{
"category": "external",
"summary": "RHBZ#2380000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380000"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-53643",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53643"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/commit/e8d774f635dc6d1cd3174d0e38891da5de0e2b6a",
"url": "https://github.com/aio-libs/aiohttp/commit/e8d774f635dc6d1cd3174d0e38891da5de0e2b6a"
},
{
"category": "external",
"summary": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-9548-qrrj-x5pj",
"url": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-9548-qrrj-x5pj"
}
],
"release_date": "2025-07-14T20:17:18.247000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-28T17:34:52+00:00",
"details": "Red Hat Ansible Automation Platform",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1506"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "aiohttp: AIOHTTP HTTP Request/Response Smuggling"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64"
],
"known_not_affected": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-28T17:34:52+00:00",
"details": "Red Hat Ansible Automation Platform",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1506"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-64460",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2025-12-02T16:01:05.300335+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418366"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Django. This vulnerability allows a remote attacker to cause a potential denial-of-service (DoS) attack triggering Central Processing Unit (CPU) and memory exhaustion via specially crafted Extensible Markup Language (XML) input processed by the XML Deserializer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Django: Django: Algorithmic complexity in XML Deserializer leads to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products that process XML input using Django\u0027s XML Deserializer, including Red Hat Ansible Automation Platform, Red Hat OpenStack Platform, and OpenShift Service Mesh. A remote attacker can exploit this flaw by providing specially crafted XML, leading to a denial-of-service due to CPU and memory exhaustion.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src"
],
"known_not_affected": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-core-1:2.16.15-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:26.1.0-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:26.1.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:ansible-test-1:2.16.15-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.25-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20260121-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20260121-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.11-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-botocore-0:1.34.162-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.37-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.11-2.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-requests-0:2.31.0-3.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-urllib3-0:2.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:receptor-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.6.3-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.6.3-1.el9ap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-64460"
},
{
"category": "external",
"summary": "RHBZ#2418366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418366"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-64460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64460"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-64460",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64460"
},
{
"category": "external",
"summary": "https://docs.djangoproject.com/en/dev/releases/security/",
"url": "https://docs.djangoproject.com/en/dev/releases/security/"
},
{
"category": "external",
"summary": "https://groups.google.com/g/django-announce",
"url": "https://groups.google.com/g/django-announce"
},
{
"category": "external",
"summary": "https://www.djangoproject.com/weblog/2025/dec/02/security-releases/",
"url": "https://www.djangoproject.com/weblog/2025/dec/02/security-releases/"
}
],
"release_date": "2025-12-02T15:15:34.451000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-28T17:34:52+00:00",
"details": "Red Hat Ansible Automation Platform",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el8ap.src",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-django-0:4.2.27-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.25-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.5:python3.11-django-0:4.2.27-1.el9ap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1506"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-core-1:2.16.15-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:26.1.0-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:26.1.1-1.el8ap.noarch",
"8Base-Ansible-Au