Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-4674 (GCVE-0-2025-4674)
Vulnerability from cvelistv5
Published
2025-07-29 21:19
Modified
2025-08-06 16:06
Severity ?
VLAI Severity ?
EPSS score ?
Summary
The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via "go get", are not affected.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Go toolchain | cmd/go |
Version: 0 ≤ Version: 1.24.0-0 ≤ |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-4674", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-06T16:03:21.628652Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-73", "description": "CWE-73 External Control of File Name or Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-06T16:06:57.979Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://pkg.go.dev", "defaultStatus": "unaffected", "packageName": "cmd/go", "product": "cmd/go", "vendor": "Go toolchain", "versions": [ { "lessThan": "1.23.11", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThan": "1.24.5", "status": "affected", "version": "1.24.0-0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "value": "RyotaK (https://ryotak.net) of GMO Flatt Security Inc" } ], "descriptions": [ { "lang": "en", "value": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-73: External Control of File Name or Path", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-29T21:19:08.519Z", "orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc", "shortName": "Go" }, "references": [ { "url": "https://go.dev/cl/686515" }, { "url": "https://go.dev/issue/74380" }, { "url": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34" }, { "url": "https://pkg.go.dev/vuln/GO-2025-3828" } ], "title": "Unexpected command execution in untrusted VCS repositories in cmd/go" } }, "cveMetadata": { "assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc", "assignerShortName": "Go", "cveId": "CVE-2025-4674", "datePublished": "2025-07-29T21:19:08.519Z", "dateReserved": "2025-05-13T23:31:07.620Z", "dateUpdated": "2025-08-06T16:06:57.979Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-4674\",\"sourceIdentifier\":\"security@golang.org\",\"published\":\"2025-07-29T22:15:25.380\",\"lastModified\":\"2025-08-06T16:15:30.087\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \\\"go get\\\", are not affected.\"},{\"lang\":\"es\",\"value\":\"El comando \\\"go\\\" puede ejecutar comandos inesperados al operar en repositorios VCS no confiables. Esto ocurre cuando existe una configuraci\u00f3n de VCS potencialmente peligrosa en los repositorios. Esto puede ocurrir cuando un repositorio se obtuvo mediante un VCS (p. ej., Git), pero contiene metadatos para otro VCS (p. ej., Mercurial). Los m\u00f3dulos obtenidos mediante la l\u00ednea de comandos \\\"go get\\\" no se ven afectados.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-73\"}]}],\"references\":[{\"url\":\"https://go.dev/cl/686515\",\"source\":\"security@golang.org\"},{\"url\":\"https://go.dev/issue/74380\",\"source\":\"security@golang.org\"},{\"url\":\"https://groups.google.com/g/golang-announce/c/gTNJnDXmn34\",\"source\":\"security@golang.org\"},{\"url\":\"https://pkg.go.dev/vuln/GO-2025-3828\",\"source\":\"security@golang.org\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.6, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-4674\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-06T16:03:21.628652Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-73\", \"description\": \"CWE-73 External Control of File Name or Path\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-06T16:04:19.737Z\"}}], \"cna\": {\"title\": \"Unexpected command execution in untrusted VCS repositories in cmd/go\", \"credits\": [{\"lang\": \"en\", \"value\": \"RyotaK (https://ryotak.net) of GMO Flatt Security Inc\"}], \"affected\": [{\"vendor\": \"Go toolchain\", \"product\": \"cmd/go\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.23.11\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"1.24.0-0\", \"lessThan\": \"1.24.5\", \"versionType\": \"semver\"}], \"packageName\": \"cmd/go\", \"collectionURL\": \"https://pkg.go.dev\", \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://go.dev/cl/686515\"}, {\"url\": \"https://go.dev/issue/74380\"}, {\"url\": \"https://groups.google.com/g/golang-announce/c/gTNJnDXmn34\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2025-3828\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \\\"go get\\\", are not affected.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-73: External Control of File Name or Path\"}]}], \"providerMetadata\": {\"orgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"shortName\": \"Go\", \"dateUpdated\": \"2025-07-29T21:19:08.519Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-4674\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-06T16:06:57.979Z\", \"dateReserved\": \"2025-05-13T23:31:07.620Z\", \"assignerOrgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"datePublished\": \"2025-07-29T21:19:08.519Z\", \"assignerShortName\": \"Go\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
rhsa-2025:13936
Vulnerability from csaf_redhat
Published
2025-08-18 00:31
Modified
2025-08-18 03:04
Summary
Red Hat Security Advisory: golang security update
Notes
Topic
An update for golang is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The golang packages provide the Go programming language compiler.
Security Fix(es):
* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for golang is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:13936", "url": "https://access.redhat.com/errata/RHSA-2025:13936" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_13936.json" } ], "title": "Red Hat Security Advisory: golang security update", "tracking": { "current_release_date": "2025-08-18T03:04:49+00:00", "generator": { "date": "2025-08-18T03:04:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:13936", "initial_release_date": "2025-08-18T00:31:32+00:00", "revision_history": [ { "date": "2025-08-18T00:31:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-08-18T00:31:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-18T03:04:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.21.13-10.el9_4.aarch64", "product": { "name": "go-toolset-0:1.21.13-10.el9_4.aarch64", "product_id": "go-toolset-0:1.21.13-10.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.21.13-10.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.21.13-10.el9_4.aarch64", "product": { "name": "golang-0:1.21.13-10.el9_4.aarch64", "product_id": "golang-0:1.21.13-10.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.21.13-10.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.21.13-10.el9_4.aarch64", "product": { "name": "golang-bin-0:1.21.13-10.el9_4.aarch64", "product_id": "golang-bin-0:1.21.13-10.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.21.13-10.el9_4?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.21.13-10.el9_4.ppc64le", "product": { "name": "go-toolset-0:1.21.13-10.el9_4.ppc64le", "product_id": "go-toolset-0:1.21.13-10.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.21.13-10.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.21.13-10.el9_4.ppc64le", "product": { "name": "golang-0:1.21.13-10.el9_4.ppc64le", "product_id": "golang-0:1.21.13-10.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.21.13-10.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.21.13-10.el9_4.ppc64le", "product": { "name": "golang-bin-0:1.21.13-10.el9_4.ppc64le", "product_id": "golang-bin-0:1.21.13-10.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.21.13-10.el9_4?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.21.13-10.el9_4.x86_64", "product": { "name": "go-toolset-0:1.21.13-10.el9_4.x86_64", "product_id": "go-toolset-0:1.21.13-10.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.21.13-10.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.21.13-10.el9_4.x86_64", "product": { "name": "golang-0:1.21.13-10.el9_4.x86_64", "product_id": "golang-0:1.21.13-10.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.21.13-10.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.21.13-10.el9_4.x86_64", "product": { "name": "golang-bin-0:1.21.13-10.el9_4.x86_64", "product_id": "golang-bin-0:1.21.13-10.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.21.13-10.el9_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.21.13-10.el9_4.s390x", "product": { "name": "go-toolset-0:1.21.13-10.el9_4.s390x", "product_id": "go-toolset-0:1.21.13-10.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.21.13-10.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.21.13-10.el9_4.s390x", "product": { "name": "golang-0:1.21.13-10.el9_4.s390x", "product_id": "golang-0:1.21.13-10.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.21.13-10.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.21.13-10.el9_4.s390x", "product": { "name": "golang-bin-0:1.21.13-10.el9_4.s390x", "product_id": "golang-bin-0:1.21.13-10.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.21.13-10.el9_4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.21.13-10.el9_4.src", "product": { "name": "golang-0:1.21.13-10.el9_4.src", "product_id": "golang-0:1.21.13-10.el9_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.21.13-10.el9_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "golang-docs-0:1.21.13-10.el9_4.noarch", "product": { "name": "golang-docs-0:1.21.13-10.el9_4.noarch", "product_id": "golang-docs-0:1.21.13-10.el9_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.21.13-10.el9_4?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.21.13-10.el9_4.noarch", "product": { "name": "golang-misc-0:1.21.13-10.el9_4.noarch", "product_id": "golang-misc-0:1.21.13-10.el9_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.21.13-10.el9_4?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.21.13-10.el9_4.noarch", "product": { "name": "golang-src-0:1.21.13-10.el9_4.noarch", "product_id": "golang-src-0:1.21.13-10.el9_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.21.13-10.el9_4?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.21.13-10.el9_4.noarch", "product": { "name": "golang-tests-0:1.21.13-10.el9_4.noarch", "product_id": "golang-tests-0:1.21.13-10.el9_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.21.13-10.el9_4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.21.13-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.aarch64" }, "product_reference": "go-toolset-0:1.21.13-10.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.21.13-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.ppc64le" }, "product_reference": "go-toolset-0:1.21.13-10.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.21.13-10.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.s390x" }, "product_reference": "go-toolset-0:1.21.13-10.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.21.13-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.x86_64" }, "product_reference": "go-toolset-0:1.21.13-10.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.21.13-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.aarch64" }, "product_reference": "golang-0:1.21.13-10.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.21.13-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.ppc64le" }, "product_reference": "golang-0:1.21.13-10.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.21.13-10.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.s390x" }, "product_reference": "golang-0:1.21.13-10.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.21.13-10.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.src" }, "product_reference": "golang-0:1.21.13-10.el9_4.src", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.21.13-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.x86_64" }, "product_reference": "golang-0:1.21.13-10.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.21.13-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.aarch64" }, "product_reference": "golang-bin-0:1.21.13-10.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.21.13-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.ppc64le" }, "product_reference": "golang-bin-0:1.21.13-10.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.21.13-10.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.s390x" }, "product_reference": "golang-bin-0:1.21.13-10.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.21.13-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.x86_64" }, "product_reference": "golang-bin-0:1.21.13-10.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.21.13-10.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-docs-0:1.21.13-10.el9_4.noarch" }, "product_reference": "golang-docs-0:1.21.13-10.el9_4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.21.13-10.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-misc-0:1.21.13-10.el9_4.noarch" }, "product_reference": "golang-misc-0:1.21.13-10.el9_4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.21.13-10.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-src-0:1.21.13-10.el9_4.noarch" }, "product_reference": "golang-src-0:1.21.13-10.el9_4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.21.13-10.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:golang-tests-0:1.21.13-10.el9_4.noarch" }, "product_reference": "golang-tests-0:1.21.13-10.el9_4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "discovery_date": "2025-07-29T22:00:54.774680+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2384329" } ], "notes": [ { "category": "description", "text": "A flaw was found in cmd/go. The `go` command can execute arbitrary commands when processing untrusted version control system (VCS) repositories containing malicious configuration. This issue occurs because the command interprets VCS metadata, potentially leading to unintended command execution. This vulnerability allows a malicious actor to trigger this by providing a repository with a crafted VCS configuration, resulting in arbitrary code execution within the context of the `go` process.", "title": "Vulnerability description" }, { "category": "summary", "text": "cmd/go: Go VCS Command Execution Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is Important rather than Moderate because it enables arbitrary command execution at the tooling level before any code is built or reviewed, effectively compromising the software supply chain at its earliest stage. Unlike flaws that require user interaction with the code itself, this issue is triggered simply by running go operations on a malicious repository\u2014an action routinely performed by developers and automated build systems. The problem lies in cmd/go\u2019s unsafe interpretation of cross-VCS metadata, allowing an attacker to inject commands that execute with the privileges of the go process.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.src", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-docs-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-misc-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-src-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-tests-0:1.21.13-10.el9_4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "RHBZ#2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-4674", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674" }, { "category": "external", "summary": "https://go.dev/cl/686515", "url": "https://go.dev/cl/686515" }, { "category": "external", "summary": "https://go.dev/issue/74380", "url": "https://go.dev/issue/74380" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34", "url": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3828", "url": "https://pkg.go.dev/vuln/GO-2025-3828" } ], "release_date": "2025-07-29T21:19:08.519000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-18T00:31:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.src", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-docs-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-misc-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-src-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-tests-0:1.21.13-10.el9_4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:13936" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.src", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-docs-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-misc-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-src-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-tests-0:1.21.13-10.el9_4.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:go-toolset-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.src", "AppStream-9.4.0.Z.EUS:golang-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.s390x", "AppStream-9.4.0.Z.EUS:golang-bin-0:1.21.13-10.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:golang-docs-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-misc-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-src-0:1.21.13-10.el9_4.noarch", "AppStream-9.4.0.Z.EUS:golang-tests-0:1.21.13-10.el9_4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cmd/go: Go VCS Command Execution Vulnerability" } ] }
rhsa-2025:13941
Vulnerability from csaf_redhat
Published
2025-08-18 00:42
Modified
2025-08-18 03:09
Summary
Red Hat Security Advisory: golang security update
Notes
Topic
An update for golang is now available for Red Hat Enterprise Linux 10.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The golang packages provide the Go programming language compiler.
Security Fix(es):
* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for golang is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:13941", "url": "https://access.redhat.com/errata/RHSA-2025:13941" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_13941.json" } ], "title": "Red Hat Security Advisory: golang security update", "tracking": { "current_release_date": "2025-08-18T03:09:34+00:00", "generator": { "date": "2025-08-18T03:09:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:13941", "initial_release_date": "2025-08-18T00:42:23+00:00", "revision_history": [ { "date": "2025-08-18T00:42:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-08-18T00:42:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-18T03:09:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 10)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:10.0" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.24.6-1.el10_0.aarch64", "product": { "name": "go-toolset-0:1.24.6-1.el10_0.aarch64", "product_id": "go-toolset-0:1.24.6-1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.24.6-1.el10_0.aarch64", "product": { "name": "golang-0:1.24.6-1.el10_0.aarch64", "product_id": "golang-0:1.24.6-1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.24.6-1.el10_0.aarch64", "product": { "name": "golang-bin-0:1.24.6-1.el10_0.aarch64", "product_id": "golang-bin-0:1.24.6-1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "golang-race-0:1.24.6-1.el10_0.aarch64", "product": { "name": "golang-race-0:1.24.6-1.el10_0.aarch64", "product_id": "golang-race-0:1.24.6-1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.24.6-1.el10_0?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.24.6-1.el10_0.ppc64le", "product": { "name": "go-toolset-0:1.24.6-1.el10_0.ppc64le", "product_id": "go-toolset-0:1.24.6-1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.24.6-1.el10_0.ppc64le", "product": { "name": "golang-0:1.24.6-1.el10_0.ppc64le", "product_id": "golang-0:1.24.6-1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.24.6-1.el10_0.ppc64le", "product": { "name": "golang-bin-0:1.24.6-1.el10_0.ppc64le", "product_id": "golang-bin-0:1.24.6-1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-race-0:1.24.6-1.el10_0.ppc64le", "product": { "name": "golang-race-0:1.24.6-1.el10_0.ppc64le", "product_id": "golang-race-0:1.24.6-1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.24.6-1.el10_0?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.24.6-1.el10_0.x86_64", "product": { "name": "go-toolset-0:1.24.6-1.el10_0.x86_64", "product_id": "go-toolset-0:1.24.6-1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.24.6-1.el10_0.x86_64", "product": { "name": "golang-0:1.24.6-1.el10_0.x86_64", "product_id": "golang-0:1.24.6-1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.24.6-1.el10_0.x86_64", "product": { "name": "golang-bin-0:1.24.6-1.el10_0.x86_64", "product_id": "golang-bin-0:1.24.6-1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "golang-race-0:1.24.6-1.el10_0.x86_64", "product": { "name": "golang-race-0:1.24.6-1.el10_0.x86_64", "product_id": "golang-race-0:1.24.6-1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.24.6-1.el10_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.24.6-1.el10_0.s390x", "product": { "name": "go-toolset-0:1.24.6-1.el10_0.s390x", "product_id": "go-toolset-0:1.24.6-1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.24.6-1.el10_0.s390x", "product": { "name": "golang-0:1.24.6-1.el10_0.s390x", "product_id": "golang-0:1.24.6-1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.24.6-1.el10_0.s390x", "product": { "name": "golang-bin-0:1.24.6-1.el10_0.s390x", "product_id": "golang-bin-0:1.24.6-1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "golang-race-0:1.24.6-1.el10_0.s390x", "product": { "name": "golang-race-0:1.24.6-1.el10_0.s390x", "product_id": "golang-race-0:1.24.6-1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.24.6-1.el10_0?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.24.6-1.el10_0.src", "product": { "name": "golang-0:1.24.6-1.el10_0.src", "product_id": "golang-0:1.24.6-1.el10_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.el10_0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "golang-docs-0:1.24.6-1.el10_0.noarch", "product": { "name": "golang-docs-0:1.24.6-1.el10_0.noarch", "product_id": "golang-docs-0:1.24.6-1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.24.6-1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.24.6-1.el10_0.noarch", "product": { "name": "golang-misc-0:1.24.6-1.el10_0.noarch", "product_id": "golang-misc-0:1.24.6-1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.24.6-1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.24.6-1.el10_0.noarch", "product": { "name": "golang-src-0:1.24.6-1.el10_0.noarch", "product_id": "golang-src-0:1.24.6-1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.24.6-1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.24.6-1.el10_0.noarch", "product": { "name": "golang-tests-0:1.24.6-1.el10_0.noarch", "product_id": "golang-tests-0:1.24.6-1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.24.6-1.el10_0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.24.6-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.aarch64" }, "product_reference": "go-toolset-0:1.24.6-1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.24.6-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.ppc64le" }, "product_reference": "go-toolset-0:1.24.6-1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.24.6-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.s390x" }, "product_reference": "go-toolset-0:1.24.6-1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.24.6-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.x86_64" }, "product_reference": "go-toolset-0:1.24.6-1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.aarch64" }, "product_reference": "golang-0:1.24.6-1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.ppc64le" }, "product_reference": "golang-0:1.24.6-1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.s390x" }, "product_reference": "golang-0:1.24.6-1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.el10_0.src as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.src" }, "product_reference": "golang-0:1.24.6-1.el10_0.src", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.x86_64" }, "product_reference": "golang-0:1.24.6-1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.24.6-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.aarch64" }, "product_reference": "golang-bin-0:1.24.6-1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.24.6-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.ppc64le" }, "product_reference": "golang-bin-0:1.24.6-1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.24.6-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.s390x" }, "product_reference": "golang-bin-0:1.24.6-1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.24.6-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.x86_64" }, "product_reference": "golang-bin-0:1.24.6-1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.24.6-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-docs-0:1.24.6-1.el10_0.noarch" }, "product_reference": "golang-docs-0:1.24.6-1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.24.6-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-misc-0:1.24.6-1.el10_0.noarch" }, "product_reference": "golang-misc-0:1.24.6-1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.24.6-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.aarch64" }, "product_reference": "golang-race-0:1.24.6-1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.24.6-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.ppc64le" }, "product_reference": "golang-race-0:1.24.6-1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.24.6-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.s390x" }, "product_reference": "golang-race-0:1.24.6-1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.24.6-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.x86_64" }, "product_reference": "golang-race-0:1.24.6-1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.24.6-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-src-0:1.24.6-1.el10_0.noarch" }, "product_reference": "golang-src-0:1.24.6-1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.24.6-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-tests-0:1.24.6-1.el10_0.noarch" }, "product_reference": "golang-tests-0:1.24.6-1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "discovery_date": "2025-07-29T22:00:54.774680+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2384329" } ], "notes": [ { "category": "description", "text": "A flaw was found in cmd/go. The `go` command can execute arbitrary commands when processing untrusted version control system (VCS) repositories containing malicious configuration. This issue occurs because the command interprets VCS metadata, potentially leading to unintended command execution. This vulnerability allows a malicious actor to trigger this by providing a repository with a crafted VCS configuration, resulting in arbitrary code execution within the context of the `go` process.", "title": "Vulnerability description" }, { "category": "summary", "text": "cmd/go: Go VCS Command Execution Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is Important rather than Moderate because it enables arbitrary command execution at the tooling level before any code is built or reviewed, effectively compromising the software supply chain at its earliest stage. Unlike flaws that require user interaction with the code itself, this issue is triggered simply by running go operations on a malicious repository\u2014an action routinely performed by developers and automated build systems. The problem lies in cmd/go\u2019s unsafe interpretation of cross-VCS metadata, allowing an attacker to inject commands that execute with the privileges of the go process.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.src", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-docs-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-misc-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-src-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-tests-0:1.24.6-1.el10_0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "RHBZ#2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-4674", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674" }, { "category": "external", "summary": "https://go.dev/cl/686515", "url": "https://go.dev/cl/686515" }, { "category": "external", "summary": "https://go.dev/issue/74380", "url": "https://go.dev/issue/74380" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34", "url": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3828", "url": "https://pkg.go.dev/vuln/GO-2025-3828" } ], "release_date": "2025-07-29T21:19:08.519000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-18T00:42:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.src", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-docs-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-misc-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-src-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-tests-0:1.24.6-1.el10_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:13941" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.src", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-docs-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-misc-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-src-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-tests-0:1.24.6-1.el10_0.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:go-toolset-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.src", "AppStream-10.0.Z:golang-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-bin-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-docs-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-misc-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.aarch64", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.s390x", "AppStream-10.0.Z:golang-race-0:1.24.6-1.el10_0.x86_64", "AppStream-10.0.Z:golang-src-0:1.24.6-1.el10_0.noarch", "AppStream-10.0.Z:golang-tests-0:1.24.6-1.el10_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cmd/go: Go VCS Command Execution Vulnerability" } ] }
rhsa-2025:13940
Vulnerability from csaf_redhat
Published
2025-08-18 00:52
Modified
2025-08-18 03:09
Summary
Red Hat Security Advisory: go-toolset:rhel8 security update
Notes
Topic
An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nSecurity Fix(es):\n\n* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:13940", "url": "https://access.redhat.com/errata/RHSA-2025:13940" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_13940.json" } ], "title": "Red Hat Security Advisory: go-toolset:rhel8 security update", "tracking": { "current_release_date": "2025-08-18T03:09:00+00:00", "generator": { "date": "2025-08-18T03:09:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:13940", "initial_release_date": "2025-08-18T00:52:32+00:00", "revision_history": [ { "date": "2025-08-18T00:52:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-08-18T00:52:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-18T03:09:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "go-toolset:rhel8:8100020250813120739:a3795dee", "product": { "name": "go-toolset:rhel8:8100020250813120739:a3795dee", "product_id": "go-toolset:rhel8:8100020250813120739:a3795dee", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@rhel8?rpmmod=go-toolset:rhel8:8100020250813120739:a3795dee" } } }, { "category": "product_version", "name": "golang-docs-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "product": { "name": "golang-docs-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "product_id": "golang-docs-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "product": { "name": "golang-misc-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "product_id": "golang-misc-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "product": { "name": "golang-src-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "product_id": "golang-src-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "product": { "name": "golang-tests-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "product_id": "golang-tests-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src", "product": { "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src", "product_id": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=src" } } }, { "category": "product_version", "name": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.src", "product": { "name": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.src", "product_id": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=src" } } }, { "category": "product_version", "name": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.src", "product": { "name": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.src", "product_id": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "product": { "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "product_id": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=aarch64" } } }, { "category": "product_version", "name": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "product": { "name": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "product_id": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=aarch64" } } }, { "category": "product_version", "name": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "product": { "name": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "product_id": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "product": { "name": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "product_id": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "product": { "name": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "product_id": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "product": { "name": "golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "product_id": "golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product": { "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product_id": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=ppc64le" } } }, { "category": "product_version", "name": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product": { "name": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product_id": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=ppc64le" } } }, { "category": "product_version", "name": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product": { "name": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product_id": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "product": { "name": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "product_id": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "product": { "name": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "product_id": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "product": { "name": "golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "product_id": "golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "product": { "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "product_id": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "product": { "name": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "product_id": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "product": { "name": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "product_id": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "product": { "name": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "product_id": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "product": { "name": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "product_id": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "product": { "name": "golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "product_id": "golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "product": { "name": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "product_id": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "product": { "name": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "product_id": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "product": { "name": "golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "product_id": "golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.module%2Bel8.10.0%2B23407%2B428597c7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, "product_reference": "go-toolset:rhel8:8100020250813120739:a3795dee", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64 as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64" }, "product_reference": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le" }, "product_reference": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src" }, "product_reference": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64 as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64" }, "product_reference": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64 as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64" }, "product_reference": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le" }, "product_reference": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64 as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64" }, "product_reference": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64 as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64" }, "product_reference": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le" }, "product_reference": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64 as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64" }, "product_reference": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64 as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64" }, "product_reference": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le" }, "product_reference": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x" }, "product_reference": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.src as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.src" }, "product_reference": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64 as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64" }, "product_reference": "go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64 as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64" }, "product_reference": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le" }, "product_reference": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x" }, "product_reference": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.src as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.src" }, "product_reference": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64 as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64" }, "product_reference": "golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64 as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64" }, "product_reference": "golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le" }, "product_reference": "golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x" }, "product_reference": "golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64 as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64" }, "product_reference": "golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-docs-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch" }, "product_reference": "golang-docs-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-misc-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch" }, "product_reference": "golang-misc-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-src-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch" }, "product_reference": "golang-src-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch as a component of go-toolset:rhel8:8100020250813120739:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-tests-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch" }, "product_reference": "golang-tests-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "discovery_date": "2025-07-29T22:00:54.774680+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2384329" } ], "notes": [ { "category": "description", "text": "A flaw was found in cmd/go. The `go` command can execute arbitrary commands when processing untrusted version control system (VCS) repositories containing malicious configuration. This issue occurs because the command interprets VCS metadata, potentially leading to unintended command execution. This vulnerability allows a malicious actor to trigger this by providing a repository with a crafted VCS configuration, resulting in arbitrary code execution within the context of the `go` process.", "title": "Vulnerability description" }, { "category": "summary", "text": "cmd/go: Go VCS Command Execution Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is Important rather than Moderate because it enables arbitrary command execution at the tooling level before any code is built or reviewed, effectively compromising the software supply chain at its earliest stage. Unlike flaws that require user interaction with the code itself, this issue is triggered simply by running go operations on a malicious repository\u2014an action routinely performed by developers and automated build systems. The problem lies in cmd/go\u2019s unsafe interpretation of cross-VCS metadata, allowing an attacker to inject commands that execute with the privileges of the go process.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-docs-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-misc-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-src-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-tests-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "RHBZ#2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-4674", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674" }, { "category": "external", "summary": "https://go.dev/cl/686515", "url": "https://go.dev/cl/686515" }, { "category": "external", "summary": "https://go.dev/issue/74380", "url": "https://go.dev/issue/74380" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34", "url": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3828", "url": "https://pkg.go.dev/vuln/GO-2025-3828" } ], "release_date": "2025-07-29T21:19:08.519000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-18T00:52:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-docs-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-misc-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-src-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-tests-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:13940" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-docs-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-misc-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-src-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-tests-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:go-toolset-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-bin-0:1.24.6-1.module+el8.10.0+23407+428597c7.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-docs-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-misc-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-src-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250813120739:a3795dee:golang-tests-0:1.24.6-1.module+el8.10.0+23407+428597c7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cmd/go: Go VCS Command Execution Vulnerability" } ] }
rhsa-2025:13935
Vulnerability from csaf_redhat
Published
2025-08-18 00:53
Modified
2025-08-18 03:09
Summary
Red Hat Security Advisory: golang security update
Notes
Topic
An update for golang is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The golang packages provide the Go programming language compiler.
Security Fix(es):
* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for golang is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:13935", "url": "https://access.redhat.com/errata/RHSA-2025:13935" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "external", "summary": "RHEL-108935", "url": "https://issues.redhat.com/browse/RHEL-108935" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_13935.json" } ], "title": "Red Hat Security Advisory: golang security update", "tracking": { "current_release_date": "2025-08-18T03:09:36+00:00", "generator": { "date": "2025-08-18T03:09:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:13935", "initial_release_date": "2025-08-18T00:53:52+00:00", "revision_history": [ { "date": "2025-08-18T00:53:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-08-18T00:53:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-18T03:09:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.24.6-1.el9_6.aarch64", "product": { "name": "go-toolset-0:1.24.6-1.el9_6.aarch64", "product_id": "go-toolset-0:1.24.6-1.el9_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.el9_6?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.24.6-1.el9_6.aarch64", "product": { "name": "golang-0:1.24.6-1.el9_6.aarch64", "product_id": "golang-0:1.24.6-1.el9_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.el9_6?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.24.6-1.el9_6.aarch64", "product": { "name": "golang-bin-0:1.24.6-1.el9_6.aarch64", "product_id": "golang-bin-0:1.24.6-1.el9_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.el9_6?arch=aarch64" } } }, { "category": "product_version", "name": "golang-race-0:1.24.6-1.el9_6.aarch64", "product": { "name": "golang-race-0:1.24.6-1.el9_6.aarch64", "product_id": "golang-race-0:1.24.6-1.el9_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.24.6-1.el9_6?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.24.6-1.el9_6.ppc64le", "product": { "name": "go-toolset-0:1.24.6-1.el9_6.ppc64le", "product_id": "go-toolset-0:1.24.6-1.el9_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.el9_6?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.24.6-1.el9_6.ppc64le", "product": { "name": "golang-0:1.24.6-1.el9_6.ppc64le", "product_id": "golang-0:1.24.6-1.el9_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.el9_6?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.24.6-1.el9_6.ppc64le", "product": { "name": "golang-bin-0:1.24.6-1.el9_6.ppc64le", "product_id": "golang-bin-0:1.24.6-1.el9_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.el9_6?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-race-0:1.24.6-1.el9_6.ppc64le", "product": { "name": "golang-race-0:1.24.6-1.el9_6.ppc64le", "product_id": "golang-race-0:1.24.6-1.el9_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.24.6-1.el9_6?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.24.6-1.el9_6.x86_64", "product": { "name": "go-toolset-0:1.24.6-1.el9_6.x86_64", "product_id": "go-toolset-0:1.24.6-1.el9_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.el9_6?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.24.6-1.el9_6.x86_64", "product": { "name": "golang-0:1.24.6-1.el9_6.x86_64", "product_id": "golang-0:1.24.6-1.el9_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.el9_6?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.24.6-1.el9_6.x86_64", "product": { "name": "golang-bin-0:1.24.6-1.el9_6.x86_64", "product_id": "golang-bin-0:1.24.6-1.el9_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.el9_6?arch=x86_64" } } }, { "category": "product_version", "name": "golang-race-0:1.24.6-1.el9_6.x86_64", "product": { "name": "golang-race-0:1.24.6-1.el9_6.x86_64", "product_id": "golang-race-0:1.24.6-1.el9_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.24.6-1.el9_6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.24.6-1.el9_6.s390x", "product": { "name": "go-toolset-0:1.24.6-1.el9_6.s390x", "product_id": "go-toolset-0:1.24.6-1.el9_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.24.6-1.el9_6?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.24.6-1.el9_6.s390x", "product": { "name": "golang-0:1.24.6-1.el9_6.s390x", "product_id": "golang-0:1.24.6-1.el9_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.el9_6?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.24.6-1.el9_6.s390x", "product": { "name": "golang-bin-0:1.24.6-1.el9_6.s390x", "product_id": "golang-bin-0:1.24.6-1.el9_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.24.6-1.el9_6?arch=s390x" } } }, { "category": "product_version", "name": "golang-race-0:1.24.6-1.el9_6.s390x", "product": { "name": "golang-race-0:1.24.6-1.el9_6.s390x", "product_id": "golang-race-0:1.24.6-1.el9_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.24.6-1.el9_6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.24.6-1.el9_6.src", "product": { "name": "golang-0:1.24.6-1.el9_6.src", "product_id": "golang-0:1.24.6-1.el9_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.24.6-1.el9_6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "golang-docs-0:1.24.6-1.el9_6.noarch", "product": { "name": "golang-docs-0:1.24.6-1.el9_6.noarch", "product_id": "golang-docs-0:1.24.6-1.el9_6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.24.6-1.el9_6?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.24.6-1.el9_6.noarch", "product": { "name": "golang-misc-0:1.24.6-1.el9_6.noarch", "product_id": "golang-misc-0:1.24.6-1.el9_6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.24.6-1.el9_6?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.24.6-1.el9_6.noarch", "product": { "name": "golang-src-0:1.24.6-1.el9_6.noarch", "product_id": "golang-src-0:1.24.6-1.el9_6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.24.6-1.el9_6?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.24.6-1.el9_6.noarch", "product": { "name": "golang-tests-0:1.24.6-1.el9_6.noarch", "product_id": "golang-tests-0:1.24.6-1.el9_6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.24.6-1.el9_6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.24.6-1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.aarch64" }, "product_reference": "go-toolset-0:1.24.6-1.el9_6.aarch64", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.24.6-1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.ppc64le" }, "product_reference": "go-toolset-0:1.24.6-1.el9_6.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.24.6-1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.s390x" }, "product_reference": "go-toolset-0:1.24.6-1.el9_6.s390x", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.24.6-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.x86_64" }, "product_reference": "go-toolset-0:1.24.6-1.el9_6.x86_64", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.aarch64" }, "product_reference": "golang-0:1.24.6-1.el9_6.aarch64", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.ppc64le" }, "product_reference": "golang-0:1.24.6-1.el9_6.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.s390x" }, "product_reference": "golang-0:1.24.6-1.el9_6.s390x", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.src" }, "product_reference": "golang-0:1.24.6-1.el9_6.src", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.24.6-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.x86_64" }, "product_reference": "golang-0:1.24.6-1.el9_6.x86_64", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.24.6-1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.aarch64" }, "product_reference": "golang-bin-0:1.24.6-1.el9_6.aarch64", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.24.6-1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.ppc64le" }, "product_reference": "golang-bin-0:1.24.6-1.el9_6.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.24.6-1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.s390x" }, "product_reference": "golang-bin-0:1.24.6-1.el9_6.s390x", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.24.6-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.x86_64" }, "product_reference": "golang-bin-0:1.24.6-1.el9_6.x86_64", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.24.6-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-docs-0:1.24.6-1.el9_6.noarch" }, "product_reference": "golang-docs-0:1.24.6-1.el9_6.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.24.6-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-misc-0:1.24.6-1.el9_6.noarch" }, "product_reference": "golang-misc-0:1.24.6-1.el9_6.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.24.6-1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.aarch64" }, "product_reference": "golang-race-0:1.24.6-1.el9_6.aarch64", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.24.6-1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.ppc64le" }, "product_reference": "golang-race-0:1.24.6-1.el9_6.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.24.6-1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.s390x" }, "product_reference": "golang-race-0:1.24.6-1.el9_6.s390x", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.24.6-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.x86_64" }, "product_reference": "golang-race-0:1.24.6-1.el9_6.x86_64", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.24.6-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-src-0:1.24.6-1.el9_6.noarch" }, "product_reference": "golang-src-0:1.24.6-1.el9_6.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.24.6-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:golang-tests-0:1.24.6-1.el9_6.noarch" }, "product_reference": "golang-tests-0:1.24.6-1.el9_6.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "discovery_date": "2025-07-29T22:00:54.774680+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2384329" } ], "notes": [ { "category": "description", "text": "A flaw was found in cmd/go. The `go` command can execute arbitrary commands when processing untrusted version control system (VCS) repositories containing malicious configuration. This issue occurs because the command interprets VCS metadata, potentially leading to unintended command execution. This vulnerability allows a malicious actor to trigger this by providing a repository with a crafted VCS configuration, resulting in arbitrary code execution within the context of the `go` process.", "title": "Vulnerability description" }, { "category": "summary", "text": "cmd/go: Go VCS Command Execution Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is Important rather than Moderate because it enables arbitrary command execution at the tooling level before any code is built or reviewed, effectively compromising the software supply chain at its earliest stage. Unlike flaws that require user interaction with the code itself, this issue is triggered simply by running go operations on a malicious repository\u2014an action routinely performed by developers and automated build systems. The problem lies in cmd/go\u2019s unsafe interpretation of cross-VCS metadata, allowing an attacker to inject commands that execute with the privileges of the go process.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.src", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-docs-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-misc-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-src-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-tests-0:1.24.6-1.el9_6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "RHBZ#2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-4674", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674" }, { "category": "external", "summary": "https://go.dev/cl/686515", "url": "https://go.dev/cl/686515" }, { "category": "external", "summary": "https://go.dev/issue/74380", "url": "https://go.dev/issue/74380" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34", "url": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3828", "url": "https://pkg.go.dev/vuln/GO-2025-3828" } ], "release_date": "2025-07-29T21:19:08.519000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-18T00:53:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.src", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-docs-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-misc-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-src-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-tests-0:1.24.6-1.el9_6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:13935" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.src", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-docs-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-misc-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-src-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-tests-0:1.24.6-1.el9_6.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:go-toolset-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.src", "AppStream-9.6.0.Z.MAIN.EUS:golang-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-bin-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-docs-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-misc-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.aarch64", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.ppc64le", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.s390x", "AppStream-9.6.0.Z.MAIN.EUS:golang-race-0:1.24.6-1.el9_6.x86_64", "AppStream-9.6.0.Z.MAIN.EUS:golang-src-0:1.24.6-1.el9_6.noarch", "AppStream-9.6.0.Z.MAIN.EUS:golang-tests-0:1.24.6-1.el9_6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cmd/go: Go VCS Command Execution Vulnerability" } ] }
rhsa-2025:13939
Vulnerability from csaf_redhat
Published
2025-08-18 00:24
Modified
2025-08-18 03:04
Summary
Red Hat Security Advisory: golang security update
Notes
Topic
An update for golang is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The golang packages provide the Go programming language compiler.
Security Fix(es):
* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for golang is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:13939", "url": "https://access.redhat.com/errata/RHSA-2025:13939" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_13939.json" } ], "title": "Red Hat Security Advisory: golang security update", "tracking": { "current_release_date": "2025-08-18T03:04:25+00:00", "generator": { "date": "2025-08-18T03:04:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:13939", "initial_release_date": "2025-08-18T00:24:18+00:00", "revision_history": [ { "date": "2025-08-18T00:24:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-08-18T00:24:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-18T03:04:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:9.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.19.13-18.el9_2.src", "product": { "name": "golang-0:1.19.13-18.el9_2.src", "product_id": "golang-0:1.19.13-18.el9_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.19.13-18.el9_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.19.13-18.el9_2.aarch64", "product": { "name": "golang-0:1.19.13-18.el9_2.aarch64", "product_id": "golang-0:1.19.13-18.el9_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.19.13-18.el9_2?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.19.13-18.el9_2.aarch64", "product": { "name": "golang-bin-0:1.19.13-18.el9_2.aarch64", "product_id": "golang-bin-0:1.19.13-18.el9_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.19.13-18.el9_2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.19.13-18.el9_2.ppc64le", "product": { "name": "golang-0:1.19.13-18.el9_2.ppc64le", "product_id": "golang-0:1.19.13-18.el9_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.19.13-18.el9_2?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.19.13-18.el9_2.ppc64le", "product": { "name": "golang-bin-0:1.19.13-18.el9_2.ppc64le", "product_id": "golang-bin-0:1.19.13-18.el9_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.19.13-18.el9_2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.19.13-18.el9_2.x86_64", "product": { "name": "golang-0:1.19.13-18.el9_2.x86_64", "product_id": "golang-0:1.19.13-18.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.19.13-18.el9_2?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.19.13-18.el9_2.x86_64", "product": { "name": "golang-bin-0:1.19.13-18.el9_2.x86_64", "product_id": "golang-bin-0:1.19.13-18.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.19.13-18.el9_2?arch=x86_64" } } }, { "category": "product_version", "name": "golang-race-0:1.19.13-18.el9_2.x86_64", "product": { "name": "golang-race-0:1.19.13-18.el9_2.x86_64", "product_id": "golang-race-0:1.19.13-18.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.19.13-18.el9_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.19.13-18.el9_2.s390x", "product": { "name": "golang-0:1.19.13-18.el9_2.s390x", "product_id": "golang-0:1.19.13-18.el9_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.19.13-18.el9_2?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.19.13-18.el9_2.s390x", "product": { "name": "golang-bin-0:1.19.13-18.el9_2.s390x", "product_id": "golang-bin-0:1.19.13-18.el9_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.19.13-18.el9_2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "golang-docs-0:1.19.13-18.el9_2.noarch", "product": { "name": "golang-docs-0:1.19.13-18.el9_2.noarch", "product_id": "golang-docs-0:1.19.13-18.el9_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.19.13-18.el9_2?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.19.13-18.el9_2.noarch", "product": { "name": "golang-misc-0:1.19.13-18.el9_2.noarch", "product_id": "golang-misc-0:1.19.13-18.el9_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.19.13-18.el9_2?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.19.13-18.el9_2.noarch", "product": { "name": "golang-src-0:1.19.13-18.el9_2.noarch", "product_id": "golang-src-0:1.19.13-18.el9_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.19.13-18.el9_2?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.19.13-18.el9_2.noarch", "product": { "name": "golang-tests-0:1.19.13-18.el9_2.noarch", "product_id": "golang-tests-0:1.19.13-18.el9_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.19.13-18.el9_2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.19.13-18.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.aarch64" }, "product_reference": "golang-0:1.19.13-18.el9_2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.19.13-18.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.ppc64le" }, "product_reference": "golang-0:1.19.13-18.el9_2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.19.13-18.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.s390x" }, "product_reference": "golang-0:1.19.13-18.el9_2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.19.13-18.el9_2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.src" }, "product_reference": "golang-0:1.19.13-18.el9_2.src", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.19.13-18.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.x86_64" }, "product_reference": "golang-0:1.19.13-18.el9_2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.19.13-18.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.aarch64" }, "product_reference": "golang-bin-0:1.19.13-18.el9_2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.19.13-18.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.ppc64le" }, "product_reference": "golang-bin-0:1.19.13-18.el9_2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.19.13-18.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.s390x" }, "product_reference": "golang-bin-0:1.19.13-18.el9_2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.19.13-18.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.x86_64" }, "product_reference": "golang-bin-0:1.19.13-18.el9_2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.19.13-18.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-docs-0:1.19.13-18.el9_2.noarch" }, "product_reference": "golang-docs-0:1.19.13-18.el9_2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.19.13-18.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-misc-0:1.19.13-18.el9_2.noarch" }, "product_reference": "golang-misc-0:1.19.13-18.el9_2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.19.13-18.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-race-0:1.19.13-18.el9_2.x86_64" }, "product_reference": "golang-race-0:1.19.13-18.el9_2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.19.13-18.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-src-0:1.19.13-18.el9_2.noarch" }, "product_reference": "golang-src-0:1.19.13-18.el9_2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.19.13-18.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:golang-tests-0:1.19.13-18.el9_2.noarch" }, "product_reference": "golang-tests-0:1.19.13-18.el9_2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "discovery_date": "2025-07-29T22:00:54.774680+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2384329" } ], "notes": [ { "category": "description", "text": "A flaw was found in cmd/go. The `go` command can execute arbitrary commands when processing untrusted version control system (VCS) repositories containing malicious configuration. This issue occurs because the command interprets VCS metadata, potentially leading to unintended command execution. This vulnerability allows a malicious actor to trigger this by providing a repository with a crafted VCS configuration, resulting in arbitrary code execution within the context of the `go` process.", "title": "Vulnerability description" }, { "category": "summary", "text": "cmd/go: Go VCS Command Execution Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is Important rather than Moderate because it enables arbitrary command execution at the tooling level before any code is built or reviewed, effectively compromising the software supply chain at its earliest stage. Unlike flaws that require user interaction with the code itself, this issue is triggered simply by running go operations on a malicious repository\u2014an action routinely performed by developers and automated build systems. The problem lies in cmd/go\u2019s unsafe interpretation of cross-VCS metadata, allowing an attacker to inject commands that execute with the privileges of the go process.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.aarch64", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.ppc64le", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.s390x", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.src", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.aarch64", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.ppc64le", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.s390x", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-docs-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-misc-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-race-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-src-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-tests-0:1.19.13-18.el9_2.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "RHBZ#2384329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-4674", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674" }, { "category": "external", "summary": "https://go.dev/cl/686515", "url": "https://go.dev/cl/686515" }, { "category": "external", "summary": "https://go.dev/issue/74380", "url": "https://go.dev/issue/74380" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34", "url": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3828", "url": "https://pkg.go.dev/vuln/GO-2025-3828" } ], "release_date": "2025-07-29T21:19:08.519000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-18T00:24:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.aarch64", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.ppc64le", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.s390x", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.src", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.aarch64", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.ppc64le", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.s390x", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-docs-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-misc-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-race-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-src-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-tests-0:1.19.13-18.el9_2.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:13939" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.aarch64", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.ppc64le", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.s390x", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.src", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.aarch64", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.ppc64le", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.s390x", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-docs-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-misc-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-race-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-src-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-tests-0:1.19.13-18.el9_2.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.aarch64", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.ppc64le", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.s390x", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.src", "AppStream-9.2.0.Z.E4S:golang-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.aarch64", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.ppc64le", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.s390x", "AppStream-9.2.0.Z.E4S:golang-bin-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-docs-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-misc-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-race-0:1.19.13-18.el9_2.x86_64", "AppStream-9.2.0.Z.E4S:golang-src-0:1.19.13-18.el9_2.noarch", "AppStream-9.2.0.Z.E4S:golang-tests-0:1.19.13-18.el9_2.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cmd/go: Go VCS Command Execution Vulnerability" } ] }
opensuse-su-2025:15330-1
Vulnerability from csaf_opensuse
Published
2025-07-09 00:00
Modified
2025-07-09 00:00
Summary
go1.25-1.25rc2-1.1 on GA media
Notes
Title of the patch
go1.25-1.25rc2-1.1 on GA media
Description of the patch
These are all security issues fixed in the go1.25-1.25rc2-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15330
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "go1.25-1.25rc2-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the go1.25-1.25rc2-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15330", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15330-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4674 page", "url": "https://www.suse.com/security/cve/CVE-2025-4674/" } ], "title": "go1.25-1.25rc2-1.1 on GA media", "tracking": { "current_release_date": "2025-07-09T00:00:00Z", "generator": { "date": "2025-07-09T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15330-1", "initial_release_date": "2025-07-09T00:00:00Z", "revision_history": [ { "date": "2025-07-09T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.25-1.25rc2-1.1.aarch64", "product": { "name": "go1.25-1.25rc2-1.1.aarch64", "product_id": "go1.25-1.25rc2-1.1.aarch64" } }, { "category": "product_version", "name": "go1.25-doc-1.25rc2-1.1.aarch64", "product": { "name": "go1.25-doc-1.25rc2-1.1.aarch64", "product_id": "go1.25-doc-1.25rc2-1.1.aarch64" } }, { "category": "product_version", "name": "go1.25-libstd-1.25rc2-1.1.aarch64", "product": { "name": "go1.25-libstd-1.25rc2-1.1.aarch64", "product_id": "go1.25-libstd-1.25rc2-1.1.aarch64" } }, { "category": "product_version", "name": "go1.25-race-1.25rc2-1.1.aarch64", "product": { "name": "go1.25-race-1.25rc2-1.1.aarch64", "product_id": "go1.25-race-1.25rc2-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.25-1.25rc2-1.1.ppc64le", "product": { "name": "go1.25-1.25rc2-1.1.ppc64le", "product_id": "go1.25-1.25rc2-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.25-doc-1.25rc2-1.1.ppc64le", "product": { "name": "go1.25-doc-1.25rc2-1.1.ppc64le", "product_id": "go1.25-doc-1.25rc2-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.25-libstd-1.25rc2-1.1.ppc64le", "product": { "name": "go1.25-libstd-1.25rc2-1.1.ppc64le", "product_id": "go1.25-libstd-1.25rc2-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.25-race-1.25rc2-1.1.ppc64le", "product": { "name": "go1.25-race-1.25rc2-1.1.ppc64le", "product_id": "go1.25-race-1.25rc2-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.25-1.25rc2-1.1.s390x", "product": { "name": "go1.25-1.25rc2-1.1.s390x", "product_id": "go1.25-1.25rc2-1.1.s390x" } }, { "category": "product_version", "name": "go1.25-doc-1.25rc2-1.1.s390x", "product": { "name": "go1.25-doc-1.25rc2-1.1.s390x", "product_id": "go1.25-doc-1.25rc2-1.1.s390x" } }, { "category": "product_version", "name": "go1.25-libstd-1.25rc2-1.1.s390x", "product": { "name": "go1.25-libstd-1.25rc2-1.1.s390x", "product_id": "go1.25-libstd-1.25rc2-1.1.s390x" } }, { "category": "product_version", "name": "go1.25-race-1.25rc2-1.1.s390x", "product": { "name": "go1.25-race-1.25rc2-1.1.s390x", "product_id": "go1.25-race-1.25rc2-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.25-1.25rc2-1.1.x86_64", "product": { "name": "go1.25-1.25rc2-1.1.x86_64", "product_id": "go1.25-1.25rc2-1.1.x86_64" } }, { "category": "product_version", "name": "go1.25-doc-1.25rc2-1.1.x86_64", "product": { "name": "go1.25-doc-1.25rc2-1.1.x86_64", "product_id": "go1.25-doc-1.25rc2-1.1.x86_64" } }, { "category": "product_version", "name": "go1.25-libstd-1.25rc2-1.1.x86_64", "product": { "name": "go1.25-libstd-1.25rc2-1.1.x86_64", "product_id": "go1.25-libstd-1.25rc2-1.1.x86_64" } }, { "category": "product_version", "name": "go1.25-race-1.25rc2-1.1.x86_64", "product": { "name": "go1.25-race-1.25rc2-1.1.x86_64", "product_id": "go1.25-race-1.25rc2-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.25-1.25rc2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.aarch64" }, "product_reference": "go1.25-1.25rc2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-1.25rc2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.ppc64le" }, "product_reference": "go1.25-1.25rc2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-1.25rc2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.s390x" }, "product_reference": "go1.25-1.25rc2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-1.25rc2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.x86_64" }, "product_reference": "go1.25-1.25rc2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-doc-1.25rc2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.aarch64" }, "product_reference": "go1.25-doc-1.25rc2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-doc-1.25rc2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.ppc64le" }, "product_reference": "go1.25-doc-1.25rc2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-doc-1.25rc2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.s390x" }, "product_reference": "go1.25-doc-1.25rc2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-doc-1.25rc2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.x86_64" }, "product_reference": "go1.25-doc-1.25rc2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-libstd-1.25rc2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.aarch64" }, "product_reference": "go1.25-libstd-1.25rc2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-libstd-1.25rc2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.ppc64le" }, "product_reference": "go1.25-libstd-1.25rc2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-libstd-1.25rc2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.s390x" }, "product_reference": "go1.25-libstd-1.25rc2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-libstd-1.25rc2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.x86_64" }, "product_reference": "go1.25-libstd-1.25rc2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-race-1.25rc2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.aarch64" }, "product_reference": "go1.25-race-1.25rc2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-race-1.25rc2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.ppc64le" }, "product_reference": "go1.25-race-1.25rc2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-race-1.25rc2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.s390x" }, "product_reference": "go1.25-race-1.25rc2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.25-race-1.25rc2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.x86_64" }, "product_reference": "go1.25-race-1.25rc2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4674" } ], "notes": [ { "category": "general", "text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4674", "url": "https://www.suse.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "SUSE Bug 1246118 for CVE-2025-4674", "url": "https://bugzilla.suse.com/1246118" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-1.25rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-doc-1.25rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-libstd-1.25rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.s390x", "openSUSE Tumbleweed:go1.25-race-1.25rc2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-09T00:00:00Z", "details": "important" } ], "title": "CVE-2025-4674" } ] }
opensuse-su-2025:15405-1
Vulnerability from csaf_opensuse
Published
2025-08-04 00:00
Modified
2025-08-04 00:00
Summary
govulncheck-vulndb-0.0.20250730T213748-1.1 on GA media
Notes
Title of the patch
govulncheck-vulndb-0.0.20250730T213748-1.1 on GA media
Description of the patch
These are all security issues fixed in the govulncheck-vulndb-0.0.20250730T213748-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15405
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "govulncheck-vulndb-0.0.20250730T213748-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the govulncheck-vulndb-0.0.20250730T213748-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15405", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15405-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2024-44905 page", "url": "https://www.suse.com/security/cve/CVE-2024-44905/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-44906 page", "url": "https://www.suse.com/security/cve/CVE-2024-44906/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56731 page", "url": "https://www.suse.com/security/cve/CVE-2024-56731/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-0928 page", "url": "https://www.suse.com/security/cve/CVE-2025-0928/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-1088 page", "url": "https://www.suse.com/security/cve/CVE-2025-1088/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-30086 page", "url": "https://www.suse.com/security/cve/CVE-2025-30086/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-32019 page", "url": "https://www.suse.com/security/cve/CVE-2025-32019/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-3227 page", "url": "https://www.suse.com/security/cve/CVE-2025-3227/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-3228 page", "url": "https://www.suse.com/security/cve/CVE-2025-3228/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-3415 page", "url": "https://www.suse.com/security/cve/CVE-2025-3415/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4563 page", "url": "https://www.suse.com/security/cve/CVE-2025-4563/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4656 page", "url": "https://www.suse.com/security/cve/CVE-2025-4656/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-46702 page", "url": "https://www.suse.com/security/cve/CVE-2025-46702/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4674 page", "url": "https://www.suse.com/security/cve/CVE-2025-4674/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47281 page", "url": "https://www.suse.com/security/cve/CVE-2025-47281/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47871 page", "url": "https://www.suse.com/security/cve/CVE-2025-47871/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47943 page", "url": "https://www.suse.com/security/cve/CVE-2025-47943/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4922 page", "url": "https://www.suse.com/security/cve/CVE-2025-4922/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4981 page", "url": "https://www.suse.com/security/cve/CVE-2025-4981/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-49825 page", "url": "https://www.suse.com/security/cve/CVE-2025-49825/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-5030 page", "url": "https://www.suse.com/security/cve/CVE-2025-5030/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-51471 page", "url": "https://www.suse.com/security/cve/CVE-2025-51471/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52477 page", "url": "https://www.suse.com/security/cve/CVE-2025-52477/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52889 page", "url": "https://www.suse.com/security/cve/CVE-2025-52889/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52890 page", "url": "https://www.suse.com/security/cve/CVE-2025-52890/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52893 page", "url": "https://www.suse.com/security/cve/CVE-2025-52893/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52894 page", "url": "https://www.suse.com/security/cve/CVE-2025-52894/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52900 page", "url": "https://www.suse.com/security/cve/CVE-2025-52900/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52901 page", "url": "https://www.suse.com/security/cve/CVE-2025-52901/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52902 page", "url": "https://www.suse.com/security/cve/CVE-2025-52902/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52903 page", "url": "https://www.suse.com/security/cve/CVE-2025-52903/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52904 page", "url": "https://www.suse.com/security/cve/CVE-2025-52904/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52995 page", "url": "https://www.suse.com/security/cve/CVE-2025-52995/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52996 page", "url": "https://www.suse.com/security/cve/CVE-2025-52996/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52997 page", "url": "https://www.suse.com/security/cve/CVE-2025-52997/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53512 page", "url": "https://www.suse.com/security/cve/CVE-2025-53512/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53513 page", "url": "https://www.suse.com/security/cve/CVE-2025-53513/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53547 page", "url": "https://www.suse.com/security/cve/CVE-2025-53547/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53632 page", "url": "https://www.suse.com/security/cve/CVE-2025-53632/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53633 page", "url": "https://www.suse.com/security/cve/CVE-2025-53633/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53634 page", "url": "https://www.suse.com/security/cve/CVE-2025-53634/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53826 page", "url": "https://www.suse.com/security/cve/CVE-2025-53826/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53893 page", "url": "https://www.suse.com/security/cve/CVE-2025-53893/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53945 page", "url": "https://www.suse.com/security/cve/CVE-2025-53945/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-54059 page", "url": "https://www.suse.com/security/cve/CVE-2025-54059/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-54379 page", "url": "https://www.suse.com/security/cve/CVE-2025-54379/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-5689 page", "url": "https://www.suse.com/security/cve/CVE-2025-5689/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-5981 page", "url": "https://www.suse.com/security/cve/CVE-2025-5981/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6023 page", "url": "https://www.suse.com/security/cve/CVE-2025-6023/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6032 page", "url": "https://www.suse.com/security/cve/CVE-2025-6032/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6224 page", "url": "https://www.suse.com/security/cve/CVE-2025-6224/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6226 page", "url": "https://www.suse.com/security/cve/CVE-2025-6226/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6227 page", "url": "https://www.suse.com/security/cve/CVE-2025-6227/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6233 page", "url": "https://www.suse.com/security/cve/CVE-2025-6233/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6264 page", "url": "https://www.suse.com/security/cve/CVE-2025-6264/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6624 page", "url": "https://www.suse.com/security/cve/CVE-2025-6624/" } ], "title": "govulncheck-vulndb-0.0.20250730T213748-1.1 on GA media", "tracking": { "current_release_date": "2025-08-04T00:00:00Z", "generator": { "date": "2025-08-04T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15405-1", "initial_release_date": "2025-08-04T00:00:00Z", "revision_history": [ { "date": "2025-08-04T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "product": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "product_id": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "product": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "product_id": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "product": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "product_id": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64", "product": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64", "product_id": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64" }, "product_reference": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le" }, "product_reference": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x" }, "product_reference": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" }, "product_reference": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-44905", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-44905" } ], "notes": [ { "category": "general", "text": "go-pg pg v10.13.0 was discovered to contain a SQL injection vulnerability via the component /types/append_value.go.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-44905", "url": "https://www.suse.com/security/cve/CVE-2024-44905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-44905" }, { "cve": "CVE-2024-44906", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-44906" } ], "notes": [ { "category": "general", "text": "uptrace pgdriver v1.2.1 was discovered to contain a SQL injection vulnerability via the appendArg function in /pgdriver/format.go. The maintainer has stated that the issue is fixed in v1.2.15.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-44906", "url": "https://www.suse.com/security/cve/CVE-2024-44906" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-44906" }, { "cve": "CVE-2024-56731", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56731" } ], "notes": [ { "category": "general", "text": "Gogs is an open source self-hosted Git service. Prior to version 0.13.3, it\u0027s still possible to delete files under the .git directory and achieve remote command execution due to an insufficient patch for CVE-2024-39931. Unprivileged user accounts can execute arbitrary commands on the Gogs instance with the privileges of the account specified by RUN_USER in the configuration. Allowing attackers to access and alter any users\u0027 code hosted on the same instance. This issue has been patched in version 0.13.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56731", "url": "https://www.suse.com/security/cve/CVE-2024-56731" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "critical" } ], "title": "CVE-2024-56731" }, { "cve": "CVE-2025-0928", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-0928" } ], "notes": [ { "category": "general", "text": "In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-0928", "url": "https://www.suse.com/security/cve/CVE-2025-0928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-0928" }, { "cve": "CVE-2025-1088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-1088" } ], "notes": [ { "category": "general", "text": "In Grafana, an excessively long dashboard title or panel name will cause Chromium browsers to become unresponsive due to Improper Input Validation vulnerability in Grafana.\nThis issue affects Grafana: before 11.6.2 and is fixed in 11.6.2 and higher.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-1088", "url": "https://www.suse.com/security/cve/CVE-2025-1088" }, { "category": "external", "summary": "SUSE Bug 1245224 for CVE-2025-1088", "url": "https://bugzilla.suse.com/1245224" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-1088" }, { "cve": "CVE-2025-30086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-30086" } ], "notes": [ { "category": "general", "text": "CNCF Harbor 2.13.x before 2.13.1 and 2.12.x before 2.12.4 allows information disclosure by administrators who can exploit an ORM Leak present in the /api/v2.0/users endpoint to leak users\u0027 password hash and salt values. The q URL parameter allows a user to filter users by any column, and filter password=~ could be abused to leak out a user\u0027s password hash character by character. An attacker with administrator access could exploit this to leak highly sensitive information stored in the Harbor database. All endpoints that support the q URL parameter are vulnerable to this ORM leak attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-30086", "url": "https://www.suse.com/security/cve/CVE-2025-30086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-30086" }, { "cve": "CVE-2025-32019", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-32019" } ], "notes": [ { "category": "general", "text": "Harbor is an open source trusted cloud native registry project that stores, signs, and scans content. Versions 2.11.2 and below, as well as versions 2.12.0-rc1 and 2.13.0-rc1, contain a vulnerability where the markdown field in the info tab page can be exploited to inject XSS code. This is fixed in versions 2.11.3 and 2.12.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-32019", "url": "https://www.suse.com/security/cve/CVE-2025-32019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-32019" }, { "cve": "CVE-2025-3227", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-3227" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to properly enforce channel member management permissions in playbook runs, allowing authenticated users without the \u0027Manage Channel Members\u0027 permission to add or remove users from public and private channels by manipulating playbook run participants when the run is linked to a channel.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-3227", "url": "https://www.suse.com/security/cve/CVE-2025-3227" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-3227" }, { "cve": "CVE-2025-3228", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-3228" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to properly retrieve requestorInfo from playbooks handler for guest users which allows an attacker access to the playbook run.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-3228", "url": "https://www.suse.com/security/cve/CVE-2025-3228" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-3228" }, { "cve": "CVE-2025-3415", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-3415" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. \nFixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-3415", "url": "https://www.suse.com/security/cve/CVE-2025-3415" }, { "category": "external", "summary": "SUSE Bug 1245302 for CVE-2025-3415", "url": "https://bugzilla.suse.com/1245302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-3415" }, { "cve": "CVE-2025-4563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4563" } ], "notes": [ { "category": "general", "text": "A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4563", "url": "https://www.suse.com/security/cve/CVE-2025-4563" }, { "category": "external", "summary": "SUSE Bug 1245185 for CVE-2025-4563", "url": "https://bugzilla.suse.com/1245185" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-4563" }, { "cve": "CVE-2025-4656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4656" } ], "notes": [ { "category": "general", "text": "Vault Community and Vault Enterprise rekey and recovery key operations can lead to a denial of service due to uncontrolled cancellation by a Vault operator. This vulnerability (CVE-2025-4656) has been remediated in Vault Community Edition 1.20.0 and Vault Enterprise 1.20.0, 1.19.6, 1.18.11, 1.17.17, and 1.16.22.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4656", "url": "https://www.suse.com/security/cve/CVE-2025-4656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "low" } ], "title": "CVE-2025-4656" }, { "cve": "CVE-2025-46702", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-46702" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to properly enforce channel member management permissions when adding participants to playbook runs. This allows authenticated users with member-level permissions to bypass system admin restrictions and add or remove users to/from private channels via the playbook run participants feature, even when the \u0027Manage Members\u0027 permission has been explicitly removed. This can lead to unauthorized access to sensitive channel content and allow guest users to gain channel management privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-46702", "url": "https://www.suse.com/security/cve/CVE-2025-46702" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-46702" }, { "cve": "CVE-2025-4674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4674" } ], "notes": [ { "category": "general", "text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4674", "url": "https://www.suse.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "SUSE Bug 1246118 for CVE-2025-4674", "url": "https://bugzilla.suse.com/1246118" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-4674" }, { "cve": "CVE-2025-47281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47281" } ], "notes": [ { "category": "general", "text": "Kyverno is a policy engine designed for cloud native platform engineering teams. In versions 1.14.1 and below, a Denial of Service (DoS) vulnerability exists due to improper handling of JMESPath variable substitutions. Attackers with permissions to create or update Kyverno policies can craft expressions using the {{@}} variable combined with a pipe and an invalid JMESPath function (e.g., {{@ | non_existent_function }}). This leads to a nil value being substituted into the policy structure. Subsequent processing by internal functions, specifically getValueAsStringMap, which expect string values, results in a panic due to a type assertion failure (interface {} is nil, not string). This crashes Kyverno worker threads in the admission controller and causes continuous crashes of the reports controller pod. This is fixed in version 1.14.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47281", "url": "https://www.suse.com/security/cve/CVE-2025-47281" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-47281" }, { "cve": "CVE-2025-47871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47871" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to properly validate channel membership when retrieving playbook run metadata, allowing authenticated users who are playbook members but not channel members to access sensitive information about linked private channels including channel name, display name, and participant count through the run metadata API endpoint.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47871", "url": "https://www.suse.com/security/cve/CVE-2025-47871" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-47871" }, { "cve": "CVE-2025-47943", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47943" } ], "notes": [ { "category": "general", "text": "Gogs is an open source self-hosted Git service. In application version 0.14.0+dev and prior, there is a stored cross-site scripting (XSS) vulnerability present in Gogs, which allows client-side Javascript code execution. The vulnerability is caused by the usage of a vulnerable and outdated component: pdfjs-1.4.20 under public/plugins/. This issue has been fixed for gogs.io/gogs in version 0.13.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47943", "url": "https://www.suse.com/security/cve/CVE-2025-47943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-47943" }, { "cve": "CVE-2025-4922", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4922" } ], "notes": [ { "category": "general", "text": "Nomad Community and Nomad Enterprise (\"Nomad\") prefix-based ACL policy lookup can lead to incorrect rule application and shadowing. This vulnerability, identified as CVE-2025-4922, is fixed in Nomad Community Edition 1.10.2 and Nomad Enterprise 1.10.2, 1.9.10, and 1.8.14.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4922", "url": "https://www.suse.com/security/cve/CVE-2025-4922" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-4922" }, { "cve": "CVE-2025-4981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4981" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to sanitize filenames in the archive extractor which allows authenticated users to write files to arbitrary locations on the filesystem via uploading archives with path traversal sequences in filenames, potentially leading to remote code execution. The vulnerability impacts instances where file uploads and document search by content is enabled (FileSettings.EnableFileAttachments = true and FileSettings.ExtractContent = true). These configuration settings are enabled by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4981", "url": "https://www.suse.com/security/cve/CVE-2025-4981" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "critical" } ], "title": "CVE-2025-4981" }, { "cve": "CVE-2025-49825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-49825" } ], "notes": [ { "category": "general", "text": "Teleport provides connectivity, authentication, access controls and audit for infrastructure. Community Edition versions before and including 17.5.1 are vulnerable to remote authentication bypass. At time of posting, there is no available open-source patch.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-49825", "url": "https://www.suse.com/security/cve/CVE-2025-49825" }, { "category": "external", "summary": "SUSE Bug 1244718 for CVE-2025-49825", "url": "https://bugzilla.suse.com/1244718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "critical" } ], "title": "CVE-2025-49825" }, { "cve": "CVE-2025-5030", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-5030" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Ackites KillWxapkg up to 2.4.1. It has been declared as critical. This vulnerability affects the function processFile of the file internal/unpack/unpack.go of the component wxapkg File Parser. The manipulation leads to os command injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-5030", "url": "https://www.suse.com/security/cve/CVE-2025-5030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-5030" }, { "cve": "CVE-2025-51471", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-51471" } ], "notes": [ { "category": "general", "text": "Cross-Domain Token Exposure in server.auth.getAuthorizationToken in Ollama 0.6.7 allows remote attackers to steal authentication tokens and bypass access controls via a malicious realm value in a WWW-Authenticate header returned by the /api/pull endpoint.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-51471", "url": "https://www.suse.com/security/cve/CVE-2025-51471" }, { "category": "external", "summary": "SUSE Bug 1246915 for CVE-2025-51471", "url": "https://bugzilla.suse.com/1246915" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-51471" }, { "cve": "CVE-2025-52477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52477" } ], "notes": [ { "category": "general", "text": "Octo-STS is a GitHub App that acts like a Security Token Service (STS) for the GitHub API. Octo-STS versions before v0.5.3 are vulnerable to unauthenticated SSRF by abusing fields in OpenID Connect tokens. Malicious tokens were shown to trigger internal network requests which could reflect error logs with sensitive information. Upgrade to v0.5.3 to resolve this issue. This version includes patch sets to sanitize input and redact logging.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52477", "url": "https://www.suse.com/security/cve/CVE-2025-52477" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52477" }, { "cve": "CVE-2025-52889", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52889" } ], "notes": [ { "category": "general", "text": "Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus version 6.12 and 6.13 generates nftables rules for local services (DHCP, DNS...) that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to DHCP pool exhaustion and opens the door for other attacks. A patch is available at commit 2516fb19ad8428454cb4edfe70c0a5f0dc1da214.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52889", "url": "https://www.suse.com/security/cve/CVE-2025-52889" }, { "category": "external", "summary": "SUSE Bug 1245365 for CVE-2025-52889", "url": "https://bugzilla.suse.com/1245365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52889" }, { "cve": "CVE-2025-52890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52890" } ], "notes": [ { "category": "general", "text": "Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus versions 6.12 and 6.13generates nftables rules that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to ARP spoofing on the bridge and to fully spoof another VM/container on the same bridge. Commit 254dfd2483ab8de39b47c2258b7f1cf0759231c8 contains a patch for the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52890", "url": "https://www.suse.com/security/cve/CVE-2025-52890" }, { "category": "external", "summary": "SUSE Bug 1245367 for CVE-2025-52890", "url": "https://bugzilla.suse.com/1245367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52890" }, { "cve": "CVE-2025-52893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52893" } ], "notes": [ { "category": "general", "text": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 may leak sensitive information in logs when processing malformed data. This is separate from the earlier HCSEC-2025-09 / CVE-2025-4166. This issue has been fixed in OpenBao v2.3.0 and later. Like with HCSEC-2025-09, there is no known workaround except to ensure properly formatted requests from all clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52893", "url": "https://www.suse.com/security/cve/CVE-2025-52893" }, { "category": "external", "summary": "SUSE Bug 1245381 for CVE-2025-52893", "url": "https://bugzilla.suse.com/1245381" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52893" }, { "cve": "CVE-2025-52894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52894" } ], "notes": [ { "category": "general", "text": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 allowed an attacker to perform unauthenticated, unaudited cancellation of root rekey and recovery rekey operations, effecting a denial of service. In OpenBao v2.2.0 and later, manually setting the configuration option `disable_unauthed_rekey_endpoints=true` allows an operator to deny these rarely-used endpoints on global listeners. A patch is available at commit fe75468822a22a88318c6079425357a02ae5b77b. In a future OpenBao release communicated on OpenBao\u0027s website, the maintainers will set this to `true` for all users and provide an authenticated alternative. As a workaround, if an active proxy or load balancer sits in front of OpenBao, an operator can deny requests to these endpoints from unauthorized IP ranges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52894", "url": "https://www.suse.com/security/cve/CVE-2025-52894" }, { "category": "external", "summary": "SUSE Bug 1245389 for CVE-2025-52894", "url": "https://bugzilla.suse.com/1245389" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52894" }, { "cve": "CVE-2025-52900", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52900" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. The file access permissions for files uploaded to or created from File Browser are never explicitly set by the application. The same is true for the database used by File Browser. On standard servers using File Browser prior to version 2.33.7 where the umask configuration has not been hardened before, this makes all the stated files readable by any operating system account. Version 2.33.7 fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52900", "url": "https://www.suse.com/security/cve/CVE-2025-52900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52900" }, { "cve": "CVE-2025-52901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52901" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.33.9, access tokens are used as GET parameters. The JSON Web Token (JWT) which is used as a session identifier will get leaked to anyone having access to the URLs accessed by the user. This will give an attacker full access to a user\u0027s account and, in consequence, to all sensitive files the user has access to. This issue has been patched in version 2.33.9.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52901", "url": "https://www.suse.com/security/cve/CVE-2025-52901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52901" }, { "cve": "CVE-2025-52902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52902" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. The Markdown preview function of File Browser prior to v2.33.7 is vulnerable to Stored Cross-Site-Scripting (XSS). Any JavaScript code that is part of a Markdown file uploaded by a user will be executed by the browser. Version 2.33.7 contains a fix for the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52902", "url": "https://www.suse.com/security/cve/CVE-2025-52902" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52902" }, { "cve": "CVE-2025-52903", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52903" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In version 2.32.0, the Command Execution feature of File Browser only allows the execution of shell command which have been predefined on a user-specific allowlist. Many tools allow the execution of arbitrary different commands, rendering this limitation void. The concrete impact depends on the commands being granted to the attacker, but the large number of standard commands allowing the execution of subcommands makes it likely that every user having the `Execute commands` permissions can exploit this vulnerability. Everyone who can exploit it will have full code execution rights with the uid of the server process. Until this issue is fixed, the maintainers recommend to completely disable `Execute commands` for all accounts. Since the command execution is an inherently dangerous feature that is not used by all deployments, it should be possible to completely disable it in the application\u0027s configuration. As a defense-in-depth measure, organizations not requiring command execution should operate the Filebrowser from a distroless container image. A patch version has been pushed to disable the feature for all existent installations, and making it opt-in. A warning has been added to the documentation and is printed on the console if the feature is enabled. Due to the project being in maintenance-only mode, the bug has not been fixed. The fix is tracked on pull request 5199.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52903", "url": "https://www.suse.com/security/cve/CVE-2025-52903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52903" }, { "cve": "CVE-2025-52904", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52904" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In version 2.32.0 of the web application, all users have a scope assigned, and they only have access to the files within that scope. The Command Execution feature of Filebrowser allows the execution of shell commands which are not restricted to the scope, potentially giving an attacker read and write access to all files managed by the server. Until this issue is fixed, the maintainers recommend to completely disable `Execute commands` for all accounts. Since the command execution is an inherently dangerous feature that is not used by all deployments, it should be possible to completely disable it in the application\u0027s configuration. As a defense-in-depth measure, organizations not requiring command execution should operate the Filebrowser from a distroless container image. A patch version has been pushed to disable the feature for all existent installations, and making it opt-in. A warning has been added to the documentation and is printed on the console if the feature is enabled. Due to the project being in maintenance-only mode, the bug has not been fixed. Fix is tracked on pull request 5199.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52904", "url": "https://www.suse.com/security/cve/CVE-2025-52904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52904" }, { "cve": "CVE-2025-52995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52995" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.33.10, the implementation of the allowlist is erroneous, allowing a user to execute more shell commands than they are authorized for. The concrete impact of this vulnerability depends on the commands configured, and the binaries installed on the server or in the container image. Due to the missing separation of scopes on the OS-level, this could give an attacker access to all files managed the application, including the File Browser database. This issue has been patched in version 2.33.10.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52995", "url": "https://www.suse.com/security/cve/CVE-2025-52995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52995" }, { "cve": "CVE-2025-52996", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52996" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In versions 2.32.0 and prior, the implementation of password protected links is error-prone, resulting in potential unprotected sharing of a file through a direct download link. This link can either be shared unknowingly by a user or discovered from various locations such as the browser history or the log of a proxy server used. At time of publication, no known patched versions are available.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52996", "url": "https://www.suse.com/security/cve/CVE-2025-52996" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52996" }, { "cve": "CVE-2025-52997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52997" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.34.1, a missing password policy and brute-force protection makes the authentication process insecure. Attackers could mount a brute-force attack to retrieve the passwords of all accounts in a given instance. This issue has been patched in version 2.34.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52997", "url": "https://www.suse.com/security/cve/CVE-2025-52997" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52997" }, { "cve": "CVE-2025-53512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53512" } ], "notes": [ { "category": "general", "text": "The /log endpoint on a Juju controller lacked sufficient authorization checks, allowing unauthorized users to access debug messages that could contain sensitive information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53512", "url": "https://www.suse.com/security/cve/CVE-2025-53512" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-53512" }, { "cve": "CVE-2025-53513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53513" } ], "notes": [ { "category": "general", "text": "The /charms endpoint on a Juju controller lacked sufficient authorization checks, allowing any user with an account on the controller to upload a charm. Uploading a malicious charm that exploits a Zip Slip vulnerability could allow an attacker to gain access to a machine running a unit through the affected charm.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53513", "url": "https://www.suse.com/security/cve/CVE-2025-53513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53513" }, { "cve": "CVE-2025-53547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53547" } ], "notes": [ { "category": "general", "text": "Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53547", "url": "https://www.suse.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "SUSE Bug 1246150 for CVE-2025-53547", "url": "https://bugzilla.suse.com/1246150" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53547" }, { "cve": "CVE-2025-53632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53632" } ], "notes": [ { "category": "general", "text": "Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. When decoding a scenario (i.e. a zip archive), the path of the file to write is not checked, potentially leading to zip slips. Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 47d188f and shipped in v0.1.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53632", "url": "https://www.suse.com/security/cve/CVE-2025-53632" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53632" }, { "cve": "CVE-2025-53633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53633" } ], "notes": [ { "category": "general", "text": "Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. When decoding a scenario (i.e. a zip archive), the size of the decoded content is not checked, potentially leading to zip bombs decompression. Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 14042aa and shipped in v0.1.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53633", "url": "https://www.suse.com/security/cve/CVE-2025-53633" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53633" }, { "cve": "CVE-2025-53634", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53634" } ], "notes": [ { "category": "general", "text": "Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. The HTTP Gateway processes headers, but with no timeout set. With a slow loris attack, an attacker could cause Denial of Service (DoS). Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 1385bd8 and shipped in v0.1.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53634", "url": "https://www.suse.com/security/cve/CVE-2025-53634" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53634" }, { "cve": "CVE-2025-53826", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53826" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename, and edit files. In version 2.39.0, File Browser\u0027s authentication system issues long-lived JWT tokens that remain valid even after the user logs out. As of time of publication, no known patches exist.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53826", "url": "https://www.suse.com/security/cve/CVE-2025-53826" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53826" }, { "cve": "CVE-2025-53893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53893" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename, and edit files. In version 2.38.0, a Denial of Service (DoS) vulnerability exists in the file processing logic when reading a file on endpoint `Filebrowser-Server-IP:PORT/files/{file-name}` . While the server correctly handles and stores uploaded files, it attempts to load the entire content into memory during read operations without size checks or resource limits. This allows an authenticated user to upload a large file and trigger uncontrolled memory consumption on read, potentially crashing the server and making it unresponsive. As of time of publication, no known patches are available.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53893", "url": "https://www.suse.com/security/cve/CVE-2025-53893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53893" }, { "cve": "CVE-2025-53945", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53945" } ], "notes": [ { "category": "general", "text": "apko allows users to build and publish OCI container images built from apk packages. Starting in version 0.27.0 and prior to version 0.29.5, critical files were inadvertently set to 0666, which could likely be abused for root escalation. Version 0.29.5 contains a fix for the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53945", "url": "https://www.suse.com/security/cve/CVE-2025-53945" }, { "category": "external", "summary": "SUSE Bug 1246746 for CVE-2025-53945", "url": "https://bugzilla.suse.com/1246746" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53945" }, { "cve": "CVE-2025-54059", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-54059" } ], "notes": [ { "category": "general", "text": "melange allows users to build apk packages using declarative pipelines. Starting in version 0.23.0 and prior to version 0.29.5, SBOM files generated by melange in apks had file system permissions mode 666. This potentially allows an unprivileged user to tamper with apk SBOMs on a running image, potentially confusing security scanners. An attacker could also perform a DoS under special circumstances. Version 0.29.5 fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-54059", "url": "https://www.suse.com/security/cve/CVE-2025-54059" }, { "category": "external", "summary": "SUSE Bug 1246745 for CVE-2025-54059", "url": "https://bugzilla.suse.com/1246745" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-54059" }, { "cve": "CVE-2025-54379", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-54379" } ], "notes": [ { "category": "general", "text": "LF Edge eKuiper is a lightweight IoT data analytics and stream processing engine running on resource-constraint edge devices. In versions before 2.2.1, there is a critical SQL Injection vulnerability in the getLast API functionality of the eKuiper project. This flaw allows unauthenticated remote attackers to execute arbitrary SQL statements on the underlying SQLite database by manipulating the table name input in an API request. Exploitation can lead to data theft, corruption, or deletion, and full database compromise. This is fixed in version 2.2.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-54379", "url": "https://www.suse.com/security/cve/CVE-2025-54379" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "not set" } ], "title": "CVE-2025-54379" }, { "cve": "CVE-2025-5689", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-5689" } ], "notes": [ { "category": "general", "text": "A flaw was found in the temporary user record that authd uses in the pre-auth NSS. As a result, a user login for the first time will be considered to be part of the root group in the context of that SSH session.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-5689", "url": "https://www.suse.com/security/cve/CVE-2025-5689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-5689" }, { "cve": "CVE-2025-5981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-5981" } ], "notes": [ { "category": "general", "text": "Arbitrary file write as the OSV-SCALIBR user on the host system via a path traversal vulnerability when using OSV-SCALIBR\u0027s unpack() function for container images. Particularly, when using the CLI flag --remote-image on untrusted container images.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-5981", "url": "https://www.suse.com/security/cve/CVE-2025-5981" }, { "category": "external", "summary": "SUSE Bug 1244726 for CVE-2025-5981", "url": "https://bugzilla.suse.com/1244726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-5981" }, { "cve": "CVE-2025-6023", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6023" } ], "notes": [ { "category": "general", "text": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6023", "url": "https://www.suse.com/security/cve/CVE-2025-6023" }, { "category": "external", "summary": "SUSE Bug 1246735 for CVE-2025-6023", "url": "https://bugzilla.suse.com/1246735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6023" }, { "cve": "CVE-2025-6032", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6032" } ], "notes": [ { "category": "general", "text": "A flaw was found in Podman. The podman machine init command fails to verify the TLS certificate when downloading the VM images from an OCI registry. This issue results in a Man In The Middle attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6032", "url": "https://www.suse.com/security/cve/CVE-2025-6032" }, { "category": "external", "summary": "SUSE Bug 1245320 for CVE-2025-6032", "url": "https://bugzilla.suse.com/1245320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6032" }, { "cve": "CVE-2025-6224", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6224" } ], "notes": [ { "category": "general", "text": "Certificate generation in juju/utils using the cert.NewLeaf function could include private information. If this certificate were then transferred over the network in plaintext, an attacker listening on that network could sniff the certificate and trivially extract the private key from it.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6224", "url": "https://www.suse.com/security/cve/CVE-2025-6224" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-6224" }, { "cve": "CVE-2025-6226", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6226" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.6, 10.8.x \u003c= 10.8.1, 10.7.x \u003c= 10.7.3, 9.11.x \u003c= 9.11.16 fail to verify authorization when retrieving cached posts by PendingPostID which allows an authenticated user to read posts in private channels they don\u0027t have access to via guessing the PendingPostID of recently created posts.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6226", "url": "https://www.suse.com/security/cve/CVE-2025-6226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-6226" }, { "cve": "CVE-2025-6227", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6227" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.7, 9.11.x \u003c= 9.11.16 fail to negotiate a new token when accepting the invite which allows a user that intercepts both invite and password to send synchronization payloads to the server that originally created the invite via the REST API.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6227", "url": "https://www.suse.com/security/cve/CVE-2025-6227" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "low" } ], "title": "CVE-2025-6227" }, { "cve": "CVE-2025-6233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6233" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.8.x \u003c= 10.8.1, 10.7.x \u003c= 10.7.3, 10.5.x \u003c= 10.5.7, 9.11.x \u003c= 9.11.16 fail to sanitize input paths of file attachments in the bulk import JSONL file, which allows a system admin to read arbitrary system files via path traversal.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6233", "url": "https://www.suse.com/security/cve/CVE-2025-6233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-6233" }, { "cve": "CVE-2025-6264", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6264" } ], "notes": [ { "category": "general", "text": "Velociraptor allows collection of VQL queries packaged into Artifacts from endpoints. These artifacts can be used to do anything and usually run with elevated permissions. To limit access to some dangerous artifact, Velociraptor allows for those to require high permissions like EXECVE to launch.\n\nThe Admin.Client.UpdateClientConfig is an artifact used to update the client\u0027s configuration. This artifact did not enforce an additional required permission, allowing users with COLLECT_CLIENT permissions (normally given by the \"Investigator\" role) to collect it from endpoints and update the configuration. \n\nThis can lead to arbitrary command execution and endpoint takeover.\n\nTo successfully exploit this vulnerability the user must already have access to collect artifacts from the endpoint (i.e. have the COLLECT_CLIENT given typically by the \"Investigator\u0027 role).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6264", "url": "https://www.suse.com/security/cve/CVE-2025-6264" }, { "category": "external", "summary": "SUSE Bug 1245123 for CVE-2025-6264", "url": "https://bugzilla.suse.com/1245123" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-6264" }, { "cve": "CVE-2025-6624", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6624" } ], "notes": [ { "category": "general", "text": "Versions of the package snyk before 1.1297.3 are vulnerable to Insertion of Sensitive Information into Log File through local Snyk CLI debug logs. Container Registry credentials provided via environment variables or command line arguments can be exposed when executing Snyk CLI in DEBUG or DEBUG/TRACE mode.\r\rThe issue affects the following Snyk commands:\r\r1. When snyk container test or snyk container monitor commands are run against a container registry, with debug mode enabled, the container registry credentials may be written into the local Snyk CLI debug log. This only happens with credentials specified in environment variables (SNYK_REGISTRY_USERNAME and SNYK_REGISTRY_PASSWORD), or in the CLI (--password/-p and --username/-u).\r\r2. When snyk auth command is executed with debug mode enabled AND the log level is set to TRACE, the Snyk access / refresh credential tokens used to connect the CLI to Snyk may be written into the local CLI debug logs.\r\r3. When snyk iac test is executed with a Remote IAC Custom rules bundle, debug mode enabled, AND the log level is set to TRACE, the docker registry token may be written into the local CLI debug logs.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6624", "url": "https://www.suse.com/security/cve/CVE-2025-6624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6624" } ] }
opensuse-su-2025:15329-1
Vulnerability from csaf_opensuse
Published
2025-07-09 00:00
Modified
2025-07-09 00:00
Summary
go1.24-1.24.5-1.1 on GA media
Notes
Title of the patch
go1.24-1.24.5-1.1 on GA media
Description of the patch
These are all security issues fixed in the go1.24-1.24.5-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15329
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "go1.24-1.24.5-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the go1.24-1.24.5-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15329", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15329-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4674 page", "url": "https://www.suse.com/security/cve/CVE-2025-4674/" } ], "title": "go1.24-1.24.5-1.1 on GA media", "tracking": { "current_release_date": "2025-07-09T00:00:00Z", "generator": { "date": "2025-07-09T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15329-1", "initial_release_date": "2025-07-09T00:00:00Z", "revision_history": [ { "date": "2025-07-09T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.24-1.24.5-1.1.aarch64", "product": { "name": "go1.24-1.24.5-1.1.aarch64", "product_id": "go1.24-1.24.5-1.1.aarch64" } }, { "category": "product_version", "name": "go1.24-doc-1.24.5-1.1.aarch64", "product": { "name": "go1.24-doc-1.24.5-1.1.aarch64", "product_id": "go1.24-doc-1.24.5-1.1.aarch64" } }, { "category": "product_version", "name": "go1.24-libstd-1.24.5-1.1.aarch64", "product": { "name": "go1.24-libstd-1.24.5-1.1.aarch64", "product_id": "go1.24-libstd-1.24.5-1.1.aarch64" } }, { "category": "product_version", "name": "go1.24-race-1.24.5-1.1.aarch64", "product": { "name": "go1.24-race-1.24.5-1.1.aarch64", "product_id": "go1.24-race-1.24.5-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.24-1.24.5-1.1.ppc64le", "product": { "name": "go1.24-1.24.5-1.1.ppc64le", "product_id": "go1.24-1.24.5-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.24-doc-1.24.5-1.1.ppc64le", "product": { "name": "go1.24-doc-1.24.5-1.1.ppc64le", "product_id": "go1.24-doc-1.24.5-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.24-libstd-1.24.5-1.1.ppc64le", "product": { "name": "go1.24-libstd-1.24.5-1.1.ppc64le", "product_id": "go1.24-libstd-1.24.5-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.24-race-1.24.5-1.1.ppc64le", "product": { "name": "go1.24-race-1.24.5-1.1.ppc64le", "product_id": "go1.24-race-1.24.5-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.24-1.24.5-1.1.s390x", "product": { "name": "go1.24-1.24.5-1.1.s390x", "product_id": "go1.24-1.24.5-1.1.s390x" } }, { "category": "product_version", "name": "go1.24-doc-1.24.5-1.1.s390x", "product": { "name": "go1.24-doc-1.24.5-1.1.s390x", "product_id": "go1.24-doc-1.24.5-1.1.s390x" } }, { "category": "product_version", "name": "go1.24-libstd-1.24.5-1.1.s390x", "product": { "name": "go1.24-libstd-1.24.5-1.1.s390x", "product_id": "go1.24-libstd-1.24.5-1.1.s390x" } }, { "category": "product_version", "name": "go1.24-race-1.24.5-1.1.s390x", "product": { "name": "go1.24-race-1.24.5-1.1.s390x", "product_id": "go1.24-race-1.24.5-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.24-1.24.5-1.1.x86_64", "product": { "name": "go1.24-1.24.5-1.1.x86_64", "product_id": "go1.24-1.24.5-1.1.x86_64" } }, { "category": "product_version", "name": "go1.24-doc-1.24.5-1.1.x86_64", "product": { "name": "go1.24-doc-1.24.5-1.1.x86_64", "product_id": "go1.24-doc-1.24.5-1.1.x86_64" } }, { "category": "product_version", "name": "go1.24-libstd-1.24.5-1.1.x86_64", "product": { "name": "go1.24-libstd-1.24.5-1.1.x86_64", "product_id": "go1.24-libstd-1.24.5-1.1.x86_64" } }, { "category": "product_version", "name": "go1.24-race-1.24.5-1.1.x86_64", "product": { "name": "go1.24-race-1.24.5-1.1.x86_64", "product_id": "go1.24-race-1.24.5-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-1.24.5-1.1.aarch64" }, "product_reference": "go1.24-1.24.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-1.24.5-1.1.ppc64le" }, "product_reference": "go1.24-1.24.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-1.24.5-1.1.s390x" }, "product_reference": "go1.24-1.24.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-1.24.5-1.1.x86_64" }, "product_reference": "go1.24-1.24.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.ppc64le" }, "product_reference": "go1.24-doc-1.24.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.s390x" }, "product_reference": "go1.24-doc-1.24.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-libstd-1.24.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.aarch64" }, "product_reference": "go1.24-libstd-1.24.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-libstd-1.24.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.ppc64le" }, "product_reference": "go1.24-libstd-1.24.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-libstd-1.24.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.s390x" }, "product_reference": "go1.24-libstd-1.24.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-libstd-1.24.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.x86_64" }, "product_reference": "go1.24-libstd-1.24.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.ppc64le" }, "product_reference": "go1.24-race-1.24.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.s390x" }, "product_reference": "go1.24-race-1.24.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4674" } ], "notes": [ { "category": "general", "text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.24-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-1.24.5-1.1.x86_64", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.x86_64", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.x86_64", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4674", "url": "https://www.suse.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "SUSE Bug 1246118 for CVE-2025-4674", "url": "https://bugzilla.suse.com/1246118" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.24-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-1.24.5-1.1.x86_64", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.x86_64", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.x86_64", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.24-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-1.24.5-1.1.x86_64", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-doc-1.24.5-1.1.x86_64", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-libstd-1.24.5-1.1.x86_64", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.aarch64", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.s390x", "openSUSE Tumbleweed:go1.24-race-1.24.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-09T00:00:00Z", "details": "important" } ], "title": "CVE-2025-4674" } ] }
opensuse-su-2025:15328-1
Vulnerability from csaf_opensuse
Published
2025-07-09 00:00
Modified
2025-07-09 00:00
Summary
go1.23-1.23.11-1.1 on GA media
Notes
Title of the patch
go1.23-1.23.11-1.1 on GA media
Description of the patch
These are all security issues fixed in the go1.23-1.23.11-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15328
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "go1.23-1.23.11-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the go1.23-1.23.11-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15328", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15328-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4674 page", "url": "https://www.suse.com/security/cve/CVE-2025-4674/" } ], "title": "go1.23-1.23.11-1.1 on GA media", "tracking": { "current_release_date": "2025-07-09T00:00:00Z", "generator": { "date": "2025-07-09T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15328-1", "initial_release_date": "2025-07-09T00:00:00Z", "revision_history": [ { "date": "2025-07-09T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.23-1.23.11-1.1.aarch64", "product": { "name": "go1.23-1.23.11-1.1.aarch64", "product_id": "go1.23-1.23.11-1.1.aarch64" } }, { "category": "product_version", "name": "go1.23-doc-1.23.11-1.1.aarch64", "product": { "name": "go1.23-doc-1.23.11-1.1.aarch64", "product_id": "go1.23-doc-1.23.11-1.1.aarch64" } }, { "category": "product_version", "name": "go1.23-libstd-1.23.11-1.1.aarch64", "product": { "name": "go1.23-libstd-1.23.11-1.1.aarch64", "product_id": "go1.23-libstd-1.23.11-1.1.aarch64" } }, { "category": "product_version", "name": "go1.23-race-1.23.11-1.1.aarch64", "product": { "name": "go1.23-race-1.23.11-1.1.aarch64", "product_id": "go1.23-race-1.23.11-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.23-1.23.11-1.1.ppc64le", "product": { "name": "go1.23-1.23.11-1.1.ppc64le", "product_id": "go1.23-1.23.11-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-doc-1.23.11-1.1.ppc64le", "product": { "name": "go1.23-doc-1.23.11-1.1.ppc64le", "product_id": "go1.23-doc-1.23.11-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-libstd-1.23.11-1.1.ppc64le", "product": { "name": "go1.23-libstd-1.23.11-1.1.ppc64le", "product_id": "go1.23-libstd-1.23.11-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-race-1.23.11-1.1.ppc64le", "product": { "name": "go1.23-race-1.23.11-1.1.ppc64le", "product_id": "go1.23-race-1.23.11-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.23-1.23.11-1.1.s390x", "product": { "name": "go1.23-1.23.11-1.1.s390x", "product_id": "go1.23-1.23.11-1.1.s390x" } }, { "category": "product_version", "name": "go1.23-doc-1.23.11-1.1.s390x", "product": { "name": "go1.23-doc-1.23.11-1.1.s390x", "product_id": "go1.23-doc-1.23.11-1.1.s390x" } }, { "category": "product_version", "name": "go1.23-libstd-1.23.11-1.1.s390x", "product": { "name": "go1.23-libstd-1.23.11-1.1.s390x", "product_id": "go1.23-libstd-1.23.11-1.1.s390x" } }, { "category": "product_version", "name": "go1.23-race-1.23.11-1.1.s390x", "product": { "name": "go1.23-race-1.23.11-1.1.s390x", "product_id": "go1.23-race-1.23.11-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.23-1.23.11-1.1.x86_64", "product": { "name": "go1.23-1.23.11-1.1.x86_64", "product_id": "go1.23-1.23.11-1.1.x86_64" } }, { "category": "product_version", "name": "go1.23-doc-1.23.11-1.1.x86_64", "product": { "name": "go1.23-doc-1.23.11-1.1.x86_64", "product_id": "go1.23-doc-1.23.11-1.1.x86_64" } }, { "category": "product_version", "name": "go1.23-libstd-1.23.11-1.1.x86_64", "product": { "name": "go1.23-libstd-1.23.11-1.1.x86_64", "product_id": "go1.23-libstd-1.23.11-1.1.x86_64" } }, { "category": "product_version", "name": "go1.23-race-1.23.11-1.1.x86_64", "product": { "name": "go1.23-race-1.23.11-1.1.x86_64", "product_id": "go1.23-race-1.23.11-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-1.23.11-1.1.aarch64" }, "product_reference": "go1.23-1.23.11-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-1.23.11-1.1.ppc64le" }, "product_reference": "go1.23-1.23.11-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-1.23.11-1.1.s390x" }, "product_reference": "go1.23-1.23.11-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-1.23.11-1.1.x86_64" }, "product_reference": "go1.23-1.23.11-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.11-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.s390x" }, "product_reference": "go1.23-doc-1.23.11-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-libstd-1.23.11-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.aarch64" }, "product_reference": "go1.23-libstd-1.23.11-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-libstd-1.23.11-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.ppc64le" }, "product_reference": "go1.23-libstd-1.23.11-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-libstd-1.23.11-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.s390x" }, "product_reference": "go1.23-libstd-1.23.11-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-libstd-1.23.11-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.x86_64" }, "product_reference": "go1.23-libstd-1.23.11-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.ppc64le" }, "product_reference": "go1.23-race-1.23.11-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.s390x" }, "product_reference": "go1.23-race-1.23.11-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4674" } ], "notes": [ { "category": "general", "text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.23-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-1.23.11-1.1.x86_64", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.x86_64", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.x86_64", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4674", "url": "https://www.suse.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "SUSE Bug 1246118 for CVE-2025-4674", "url": "https://bugzilla.suse.com/1246118" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.23-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-1.23.11-1.1.x86_64", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.x86_64", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.x86_64", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.23-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-1.23.11-1.1.x86_64", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-doc-1.23.11-1.1.x86_64", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-libstd-1.23.11-1.1.x86_64", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.aarch64", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.s390x", "openSUSE Tumbleweed:go1.23-race-1.23.11-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-09T00:00:00Z", "details": "important" } ], "title": "CVE-2025-4674" } ] }
wid-sec-w-2025-1516
Vulnerability from csaf_certbund
Published
2025-07-08 22:00
Modified
2025-07-30 22:00
Summary
Golang Go: Schwachstelle ermöglicht Codeausführung
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Golang Go ist eine Open Source Plattform.
Angriff
Ein lokaler Angreifer kann eine Schwachstelle in Golang Go ausnutzen, um Code zur Ausführung zu bringen
Betroffene Betriebssysteme
- Android
- Linux
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Golang Go ist eine Open Source Plattform.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann eine Schwachstelle in Golang Go ausnutzen, um Code zur Ausf\u00fchrung zu bringen", "title": "Angriff" }, { "category": "general", "text": "- Android\n- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-1516 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1516.json" }, { "category": "self", "summary": "WID-SEC-2025-1516 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1516" }, { "category": "external", "summary": "Go 1.24.5 Release Notes vom 2025-07-08", "url": "https://go.dev/doc/devel/release#go1.24.5" }, { "category": "external", "summary": "Go 1.25 Release Notes vom 2025-07-08", "url": "https://tip.golang.org/doc/go1.25" }, { "category": "external", "summary": "golang GitHub Issue #74380 vom 2025-07-08", "url": "https://github.com/golang/go/issues/74380" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:15329-1 vom 2025-07-10", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7X46SDCH6UTUTDOQ6JQY5P7LTACN2KXN/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02296-1 vom 2025-07-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021797.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02295-1 vom 2025-07-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021798.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2025-2939 vom 2025-07-30", "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2939.html" } ], "source_lang": "en-US", "title": "Golang Go: Schwachstelle erm\u00f6glicht Codeausf\u00fchrung", "tracking": { "current_release_date": "2025-07-30T22:00:00.000+00:00", "generator": { "date": "2025-07-31T07:50:10.220+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-1516", "initial_release_date": "2025-07-08T22:00:00.000+00:00", "revision_history": [ { "date": "2025-07-08T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-07-10T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2025-07-13T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-30T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Amazon aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c1.24.5", "product": { "name": "Golang Go \u003c1.24.5", "product_id": "T045284" } }, { "category": "product_version", "name": "1.24.5", "product": { "name": "Golang Go 1.24.5", "product_id": "T045284-fixed", "product_identification_helper": { "cpe": "cpe:/a:golang:go:1.24.5" } } }, { "category": "product_version_range", "name": "\u003c1.25", "product": { "name": "Golang Go \u003c1.25", "product_id": "T045285" } }, { "category": "product_version", "name": "1.25", "product": { "name": "Golang Go 1.25", "product_id": "T045285-fixed", "product_identification_helper": { "cpe": "cpe:/a:golang:go:1.25" } } } ], "category": "product_name", "name": "Go" } ], "category": "vendor", "name": "Golang" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "product_status": { "known_affected": [ "T002207", "T027843", "T045284", "398363", "T045285" ] }, "release_date": "2025-07-08T22:00:00.000+00:00", "title": "CVE-2025-4674" } ] }
fkie_cve-2025-4674
Vulnerability from fkie_nvd
Published
2025-07-29 22:15
Modified
2025-08-06 16:15
Severity ?
Summary
The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via "go get", are not affected.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected." }, { "lang": "es", "value": "El comando \"go\" puede ejecutar comandos inesperados al operar en repositorios VCS no confiables. Esto ocurre cuando existe una configuraci\u00f3n de VCS potencialmente peligrosa en los repositorios. Esto puede ocurrir cuando un repositorio se obtuvo mediante un VCS (p. ej., Git), pero contiene metadatos para otro VCS (p. ej., Mercurial). Los m\u00f3dulos obtenidos mediante la l\u00ednea de comandos \"go get\" no se ven afectados." } ], "id": "CVE-2025-4674", "lastModified": "2025-08-06T16:15:30.087", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 6.0, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-07-29T22:15:25.380", "references": [ { "source": "security@golang.org", "url": "https://go.dev/cl/686515" }, { "source": "security@golang.org", "url": "https://go.dev/issue/74380" }, { "source": "security@golang.org", "url": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34" }, { "source": "security@golang.org", "url": "https://pkg.go.dev/vuln/GO-2025-3828" } ], "sourceIdentifier": "security@golang.org", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-73" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
suse-su-2025:02296-1
Vulnerability from csaf_suse
Published
2025-07-11 15:20
Modified
2025-07-11 15:20
Summary
Security update for go1.23
Notes
Title of the patch
Security update for go1.23
Description of the patch
This update for go1.23 fixes the following issues:
- Update to version go1.23.11
- CVE-2025-4674: Fixed potential command execution in untrusted VCS repositories. (bsc#1246118)
Patchnames
SUSE-2025-2296,SUSE-SLE-Module-Development-Tools-15-SP6-2025-2296,SUSE-SLE-Module-Development-Tools-15-SP7-2025-2296,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2296,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2296,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2296,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2296,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2296,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2296,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2296,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2296,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2296,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2296,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2296,SUSE-Storage-7.1-2025-2296,openSUSE-SLE-15.6-2025-2296
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for go1.23", "title": "Title of the patch" }, { "category": "description", "text": "This update for go1.23 fixes the following issues:\n\n- Update to version go1.23.11\n- CVE-2025-4674: Fixed potential command execution in untrusted VCS repositories. (bsc#1246118)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-2296,SUSE-SLE-Module-Development-Tools-15-SP6-2025-2296,SUSE-SLE-Module-Development-Tools-15-SP7-2025-2296,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2296,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2296,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2296,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2296,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2296,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2296,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2296,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2296,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2296,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2296,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2296,SUSE-Storage-7.1-2025-2296,openSUSE-SLE-15.6-2025-2296", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02296-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:02296-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502296-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:02296-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040692.html" }, { "category": "self", "summary": "SUSE Bug 1229122", "url": "https://bugzilla.suse.com/1229122" }, { "category": "self", "summary": "SUSE Bug 1246118", "url": "https://bugzilla.suse.com/1246118" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4674 page", "url": "https://www.suse.com/security/cve/CVE-2025-4674/" } ], "title": "Security update for go1.23", "tracking": { "current_release_date": "2025-07-11T15:20:05Z", "generator": { "date": "2025-07-11T15:20:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:02296-1", "initial_release_date": "2025-07-11T15:20:05Z", "revision_history": [ { "date": "2025-07-11T15:20:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.23-1.23.11-150000.1.37.1.aarch64", "product": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64", "product_id": "go1.23-1.23.11-150000.1.37.1.aarch64" } }, { "category": "product_version", "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "product": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "product_id": "go1.23-doc-1.23.11-150000.1.37.1.aarch64" } }, { "category": "product_version", "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "product": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "product_id": "go1.23-race-1.23.11-150000.1.37.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.23-1.23.11-150000.1.37.1.i586", "product": { "name": "go1.23-1.23.11-150000.1.37.1.i586", "product_id": "go1.23-1.23.11-150000.1.37.1.i586" } }, { "category": "product_version", "name": "go1.23-doc-1.23.11-150000.1.37.1.i586", "product": { "name": "go1.23-doc-1.23.11-150000.1.37.1.i586", "product_id": "go1.23-doc-1.23.11-150000.1.37.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "go1.23-1.23.11-150000.1.37.1.ppc64le", "product": { "name": "go1.23-1.23.11-150000.1.37.1.ppc64le", "product_id": "go1.23-1.23.11-150000.1.37.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "product": { "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "product_id": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "product": { "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "product_id": "go1.23-race-1.23.11-150000.1.37.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.23-1.23.11-150000.1.37.1.s390x", "product": { "name": "go1.23-1.23.11-150000.1.37.1.s390x", "product_id": "go1.23-1.23.11-150000.1.37.1.s390x" } }, { "category": "product_version", "name": "go1.23-doc-1.23.11-150000.1.37.1.s390x", "product": { "name": "go1.23-doc-1.23.11-150000.1.37.1.s390x", "product_id": "go1.23-doc-1.23.11-150000.1.37.1.s390x" } }, { "category": "product_version", "name": "go1.23-race-1.23.11-150000.1.37.1.s390x", "product": { "name": "go1.23-race-1.23.11-150000.1.37.1.s390x", "product_id": "go1.23-race-1.23.11-150000.1.37.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.23-1.23.11-150000.1.37.1.x86_64", "product": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64", "product_id": "go1.23-1.23.11-150000.1.37.1.x86_64" } }, { "category": "product_version", "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "product": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "product_id": "go1.23-doc-1.23.11-150000.1.37.1.x86_64" } }, { "category": "product_version", "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "product": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "product_id": "go1.23-race-1.23.11-150000.1.37.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP7", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp5" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.11-150000.1.37.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.11-150000.1.37.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-doc-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.aarch64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.ppc64le" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.s390x" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.11-150000.1.37.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.x86_64" }, "product_reference": "go1.23-race-1.23.11-150000.1.37.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4674" } ], "notes": [ { "category": "general", "text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.11-150000.1.37.1.x86_64", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.aarch64", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.ppc64le", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.s390x", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.x86_64", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.s390x", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.aarch64", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.s390x", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4674", "url": "https://www.suse.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "SUSE Bug 1246118 for CVE-2025-4674", "url": "https://bugzilla.suse.com/1246118" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.11-150000.1.37.1.x86_64", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.aarch64", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.ppc64le", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.s390x", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.x86_64", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.s390x", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.aarch64", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.s390x", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.11-150000.1.37.1.x86_64", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.aarch64", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.ppc64le", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.s390x", "openSUSE Leap 15.6:go1.23-1.23.11-150000.1.37.1.x86_64", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.aarch64", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.ppc64le", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.s390x", "openSUSE Leap 15.6:go1.23-doc-1.23.11-150000.1.37.1.x86_64", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.aarch64", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.ppc64le", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.s390x", "openSUSE Leap 15.6:go1.23-race-1.23.11-150000.1.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-11T15:20:05Z", "details": "important" } ], "title": "CVE-2025-4674" } ] }
suse-su-2025:02812-1
Vulnerability from csaf_suse
Published
2025-08-15 12:52
Modified
2025-08-15 12:52
Summary
Security update for go1.23-openssl
Notes
Title of the patch
Security update for go1.23-openssl
Description of the patch
This update for go1.23-openssl fixes the following issues:
Updated to go1.23.12 (released 2025-08-06) (bsc#1229122):
- CVE-2025-4674: Fixed unexpected command execution in untrusted VCS repositories in cmd/go (bsc#1246118)
- CVE-2025-47906: Fixed incorrect expansion of '', '.' and '..' in some PATH configurations in LookPath in osc/exec (bsc#1247719)
- CVE-2025-47907: Fixed incorrect results returned from Rows.Scan in database/sql (bsc#1247720)
Updated to version 1.23.12 cut from the go1.23-fips-release
branch at the revision tagged go1.23.12-1-openssl-fips (jsc#SLE-18320)
- Fix HKDF-Extract The latest OpenSSL in c9s/c10s requires nil
salt to be passed as a hash length buffer of zeros.
Other fixes:
- runtime: use-after-free of allpSnapshot in findRunnable
- runtime: segfaults in runtime.(*unwinder).next
- cmd/go: TestScript/build_trimpath_cgo fails to decode dwarf on release-branch.go1.23
- cmd/cgo/internal/testsanitizers: failures with signal: segmentation fault or exit status 66
- runtime: bad frame pointer during panic during duffcopy
- runtime: heap mspan limit is set too late, causing data race between span allocation and conservative scanning
- internal/trace: stress tests triggering suspected deadlock in tracer
- runtime/pprof: crash 'cannot read stack of running goroutine' in goroutine profile
- cmd/link: duplicated definition of symbol github.com/ebitengine/purego.syscall15XABI0 when running with ASAN
Patchnames
SUSE-2025-2812,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2812,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2812,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2812,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2812,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2812,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2812,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2812,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2812,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2812,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2812,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2812,SUSE-Storage-7.1-2025-2812
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for go1.23-openssl", "title": "Title of the patch" }, { "category": "description", "text": "This update for go1.23-openssl fixes the following issues:\n\nUpdated to go1.23.12 (released 2025-08-06) (bsc#1229122): \n - CVE-2025-4674: Fixed unexpected command execution in untrusted VCS repositories in cmd/go (bsc#1246118) \n - CVE-2025-47906: Fixed incorrect expansion of \u0027\u0027, \u0027.\u0027 and \u0027..\u0027 in some PATH configurations in LookPath in osc/exec (bsc#1247719) \n - CVE-2025-47907: Fixed incorrect results returned from Rows.Scan in database/sql (bsc#1247720) \n\nUpdated to version 1.23.12 cut from the go1.23-fips-release\nbranch at the revision tagged go1.23.12-1-openssl-fips (jsc#SLE-18320)\n - Fix HKDF-Extract The latest OpenSSL in c9s/c10s requires nil\n salt to be passed as a hash length buffer of zeros.\n \nOther fixes:\n - runtime: use-after-free of allpSnapshot in findRunnable\n - runtime: segfaults in runtime.(*unwinder).next\n - cmd/go: TestScript/build_trimpath_cgo fails to decode dwarf on release-branch.go1.23\n - cmd/cgo/internal/testsanitizers: failures with signal: segmentation fault or exit status 66\n - runtime: bad frame pointer during panic during duffcopy\n - runtime: heap mspan limit is set too late, causing data race between span allocation and conservative scanning\n - internal/trace: stress tests triggering suspected deadlock in tracer\n - runtime/pprof: crash \u0027cannot read stack of running goroutine\u0027 in goroutine profile\n - cmd/link: duplicated definition of symbol github.com/ebitengine/purego.syscall15XABI0 when running with ASAN \n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-2812,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2812,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2812,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2812,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2812,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2812,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2812,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2812,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2812,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2812,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2812,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2812,SUSE-Storage-7.1-2025-2812", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02812-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:02812-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502812-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:02812-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041227.html" }, { "category": "self", "summary": "SUSE Bug 1229122", "url": "https://bugzilla.suse.com/1229122" }, { "category": "self", "summary": "SUSE Bug 1246118", "url": "https://bugzilla.suse.com/1246118" }, { "category": "self", "summary": "SUSE Bug 1247719", "url": "https://bugzilla.suse.com/1247719" }, { "category": "self", "summary": "SUSE Bug 1247720", "url": "https://bugzilla.suse.com/1247720" }, { "category": "self", "summary": "SUSE Bug 1247816", "url": "https://bugzilla.suse.com/1247816" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4674 page", "url": "https://www.suse.com/security/cve/CVE-2025-4674/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47906 page", "url": "https://www.suse.com/security/cve/CVE-2025-47906/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47907 page", "url": "https://www.suse.com/security/cve/CVE-2025-47907/" } ], "title": "Security update for go1.23-openssl", "tracking": { "current_release_date": "2025-08-15T12:52:43Z", "generator": { "date": "2025-08-15T12:52:43Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:02812-1", "initial_release_date": "2025-08-15T12:52:43Z", "revision_history": [ { "date": "2025-08-15T12:52:43Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "product": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "product_id": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64" } }, { "category": "product_version", "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "product": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "product_id": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64" } }, { "category": "product_version", "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "product": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "product_id": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.23-openssl-1.23.12-150000.1.18.1.i586", "product": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.i586", "product_id": "go1.23-openssl-1.23.12-150000.1.18.1.i586" } }, { "category": "product_version", "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.i586", "product": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.i586", "product_id": "go1.23-openssl-doc-1.23.12-150000.1.18.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "product": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "product_id": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "product": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "product_id": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "product": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "product_id": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.23-openssl-1.23.12-150000.1.18.1.s390x", "product": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.s390x", "product_id": "go1.23-openssl-1.23.12-150000.1.18.1.s390x" } }, { "category": "product_version", "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "product": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "product_id": "go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x" } }, { "category": "product_version", "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "product": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "product_id": "go1.23-openssl-race-1.23.12-150000.1.18.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "product": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "product_id": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64" } }, { "category": "product_version", "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "product": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "product_id": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" } }, { "category": "product_version", "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "product": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "product_id": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp5" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4674" } ], "notes": [ { "category": "general", "text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4674", "url": "https://www.suse.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "SUSE Bug 1246118 for CVE-2025-4674", "url": "https://bugzilla.suse.com/1246118" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-15T12:52:43Z", "details": "important" } ], "title": "CVE-2025-4674" }, { "cve": "CVE-2025-47906", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47906" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47906", "url": "https://www.suse.com/security/cve/CVE-2025-47906" }, { "category": "external", "summary": "SUSE Bug 1247719 for CVE-2025-47906", "url": "https://bugzilla.suse.com/1247719" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-15T12:52:43Z", "details": "moderate" } ], "title": "CVE-2025-47906" }, { "cve": "CVE-2025-47907", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47907" } ], "notes": [ { "category": "general", "text": "Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the expected results with those of another query, causing the call to Scan to return either unexpected results from the other query or an error.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47907", "url": "https://www.suse.com/security/cve/CVE-2025-47907" }, { "category": "external", "summary": "SUSE Bug 1247720 for CVE-2025-47907", "url": "https://bugzilla.suse.com/1247720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.12-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.12-150000.1.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-15T12:52:43Z", "details": "moderate" } ], "title": "CVE-2025-47907" } ] }
suse-su-2025:02295-1
Vulnerability from csaf_suse
Published
2025-07-11 15:18
Modified
2025-07-11 15:18
Summary
Security update for go1.24
Notes
Title of the patch
Security update for go1.24
Description of the patch
This update for go1.24 fixes the following issues:
- Update to version go1.24.5
- CVE-2025-4674: Fixed potential command execution in untrusted VCS repositories. (bsc#1246118)
Patchnames
SUSE-2025-2295,SUSE-SLE-Module-Development-Tools-15-SP6-2025-2295,SUSE-SLE-Module-Development-Tools-15-SP7-2025-2295,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2295,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2295,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2295,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2295,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2295,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2295,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2295,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2295,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2295,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2295,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2295,SUSE-Storage-7.1-2025-2295,openSUSE-SLE-15.6-2025-2295
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for go1.24", "title": "Title of the patch" }, { "category": "description", "text": "This update for go1.24 fixes the following issues:\n\n- Update to version go1.24.5\n- CVE-2025-4674: Fixed potential command execution in untrusted VCS repositories. (bsc#1246118)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-2295,SUSE-SLE-Module-Development-Tools-15-SP6-2025-2295,SUSE-SLE-Module-Development-Tools-15-SP7-2025-2295,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2295,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2295,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2295,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2295,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2295,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2295,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2295,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2295,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2295,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2295,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2295,SUSE-Storage-7.1-2025-2295,openSUSE-SLE-15.6-2025-2295", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02295-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:02295-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502295-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:02295-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040693.html" }, { "category": "self", "summary": "SUSE Bug 1236217", "url": "https://bugzilla.suse.com/1236217" }, { "category": "self", "summary": "SUSE Bug 1246118", "url": "https://bugzilla.suse.com/1246118" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4674 page", "url": "https://www.suse.com/security/cve/CVE-2025-4674/" } ], "title": "Security update for go1.24", "tracking": { "current_release_date": "2025-07-11T15:18:49Z", "generator": { "date": "2025-07-11T15:18:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:02295-1", "initial_release_date": "2025-07-11T15:18:49Z", "revision_history": [ { "date": "2025-07-11T15:18:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.24-1.24.5-150000.1.29.1.aarch64", "product": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64", "product_id": "go1.24-1.24.5-150000.1.29.1.aarch64" } }, { "category": "product_version", "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "product": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "product_id": "go1.24-doc-1.24.5-150000.1.29.1.aarch64" } }, { "category": "product_version", "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "product": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "product_id": "go1.24-race-1.24.5-150000.1.29.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.24-1.24.5-150000.1.29.1.i586", "product": { "name": "go1.24-1.24.5-150000.1.29.1.i586", "product_id": "go1.24-1.24.5-150000.1.29.1.i586" } }, { "category": "product_version", "name": "go1.24-doc-1.24.5-150000.1.29.1.i586", "product": { "name": "go1.24-doc-1.24.5-150000.1.29.1.i586", "product_id": "go1.24-doc-1.24.5-150000.1.29.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "go1.24-1.24.5-150000.1.29.1.ppc64le", "product": { "name": "go1.24-1.24.5-150000.1.29.1.ppc64le", "product_id": "go1.24-1.24.5-150000.1.29.1.ppc64le" } }, { "category": "product_version", "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "product": { "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "product_id": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le" } }, { "category": "product_version", "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "product": { "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "product_id": "go1.24-race-1.24.5-150000.1.29.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.24-1.24.5-150000.1.29.1.s390x", "product": { "name": "go1.24-1.24.5-150000.1.29.1.s390x", "product_id": "go1.24-1.24.5-150000.1.29.1.s390x" } }, { "category": "product_version", "name": "go1.24-doc-1.24.5-150000.1.29.1.s390x", "product": { "name": "go1.24-doc-1.24.5-150000.1.29.1.s390x", "product_id": "go1.24-doc-1.24.5-150000.1.29.1.s390x" } }, { "category": "product_version", "name": "go1.24-race-1.24.5-150000.1.29.1.s390x", "product": { "name": "go1.24-race-1.24.5-150000.1.29.1.s390x", "product_id": "go1.24-race-1.24.5-150000.1.29.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.24-1.24.5-150000.1.29.1.x86_64", "product": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64", "product_id": "go1.24-1.24.5-150000.1.29.1.x86_64" } }, { "category": "product_version", "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "product": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "product_id": "go1.24-doc-1.24.5-150000.1.29.1.x86_64" } }, { "category": "product_version", "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "product": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "product_id": "go1.24-race-1.24.5-150000.1.29.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP7", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp5" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24.5-150000.1.29.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24.5-150000.1.29.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-doc-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.aarch64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.ppc64le" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.s390x" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24.5-150000.1.29.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.x86_64" }, "product_reference": "go1.24-race-1.24.5-150000.1.29.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4674" } ], "notes": [ { "category": "general", "text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.5-150000.1.29.1.x86_64", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.aarch64", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.ppc64le", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.s390x", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.x86_64", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.s390x", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.aarch64", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.s390x", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4674", "url": "https://www.suse.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "SUSE Bug 1246118 for CVE-2025-4674", "url": "https://bugzilla.suse.com/1246118" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.5-150000.1.29.1.x86_64", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.aarch64", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.ppc64le", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.s390x", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.x86_64", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.s390x", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.aarch64", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.s390x", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.5-150000.1.29.1.x86_64", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.aarch64", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.ppc64le", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.s390x", "openSUSE Leap 15.6:go1.24-1.24.5-150000.1.29.1.x86_64", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.aarch64", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.ppc64le", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.s390x", "openSUSE Leap 15.6:go1.24-doc-1.24.5-150000.1.29.1.x86_64", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.aarch64", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.ppc64le", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.s390x", "openSUSE Leap 15.6:go1.24-race-1.24.5-150000.1.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-11T15:18:49Z", "details": "important" } ], "title": "CVE-2025-4674" } ] }
ghsa-wprm-fgrx-xj42
Vulnerability from github
Published
2025-07-30 00:32
Modified
2025-08-06 18:31
Severity ?
VLAI Severity ?
Details
The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via "go get", are not affected.
{ "affected": [], "aliases": [ "CVE-2025-4674" ], "database_specific": { "cwe_ids": [ "CWE-73" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-29T22:15:25Z", "severity": "HIGH" }, "details": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.", "id": "GHSA-wprm-fgrx-xj42", "modified": "2025-08-06T18:31:12Z", "published": "2025-07-30T00:32:18Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4674" }, { "type": "WEB", "url": "https://go.dev/cl/686515" }, { "type": "WEB", "url": "https://go.dev/issue/74380" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/gTNJnDXmn34" }, { "type": "WEB", "url": "https://pkg.go.dev/vuln/GO-2025-3828" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…