OPENSUSE-SU-2026:20077-1

Vulnerability from csaf_opensuse - Published: 2026-01-22 12:53 - Updated: 2026-01-22 12:53
Summary
Security update for go1.24

Notes

Title of the patch
Security update for go1.24
Description of the patch
This update for go1.24 fixes the following issues: Update to go1.24.12 (released 2026-01-15) (bsc#1236217) Security fixes: - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821). - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820). - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819). - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817). - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816). - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818). Other fixes: * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386 * go#76796 runtime: race detector crash on ppc64le * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling <function>: runtime error: index out of range
Patchnames
openSUSE-Leap-16.0-166
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for go1.24",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for go1.24 fixes the following issues:\n\nUpdate to go1.24.12 (released 2026-01-15) (bsc#1236217)\n\nSecurity fixes:\n\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n  * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n  * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes\n  * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n  * go#76796 runtime: race detector crash on ppc64le\n  * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Leap-16.0-166",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20077-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1236217",
        "url": "https://bugzilla.suse.com/1236217"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256816",
        "url": "https://bugzilla.suse.com/1256816"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256817",
        "url": "https://bugzilla.suse.com/1256817"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256818",
        "url": "https://bugzilla.suse.com/1256818"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256819",
        "url": "https://bugzilla.suse.com/1256819"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256820",
        "url": "https://bugzilla.suse.com/1256820"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256821",
        "url": "https://bugzilla.suse.com/1256821"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-61726 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-61726/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-61728 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-61728/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-61730 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-61730/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-61731 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-61731/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68119 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68119/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68121 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68121/"
      }
    ],
    "title": "Security update for go1.24",
    "tracking": {
      "current_release_date": "2026-01-22T12:53:33Z",
      "generator": {
        "date": "2026-01-22T12:53:33Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2026:20077-1",
      "initial_release_date": "2026-01-22T12:53:33Z",
      "revision_history": [
        {
          "date": "2026-01-22T12:53:33Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go1.24-1.24.12-160000.1.1.aarch64",
                "product": {
                  "name": "go1.24-1.24.12-160000.1.1.aarch64",
                  "product_id": "go1.24-1.24.12-160000.1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "go1.24-doc-1.24.12-160000.1.1.aarch64",
                "product": {
                  "name": "go1.24-doc-1.24.12-160000.1.1.aarch64",
                  "product_id": "go1.24-doc-1.24.12-160000.1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
                "product": {
                  "name": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
                  "product_id": "go1.24-libstd-1.24.12-160000.1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "go1.24-race-1.24.12-160000.1.1.aarch64",
                "product": {
                  "name": "go1.24-race-1.24.12-160000.1.1.aarch64",
                  "product_id": "go1.24-race-1.24.12-160000.1.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go1.24-1.24.12-160000.1.1.ppc64le",
                "product": {
                  "name": "go1.24-1.24.12-160000.1.1.ppc64le",
                  "product_id": "go1.24-1.24.12-160000.1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
                "product": {
                  "name": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
                  "product_id": "go1.24-doc-1.24.12-160000.1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "go1.24-race-1.24.12-160000.1.1.ppc64le",
                "product": {
                  "name": "go1.24-race-1.24.12-160000.1.1.ppc64le",
                  "product_id": "go1.24-race-1.24.12-160000.1.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go1.24-1.24.12-160000.1.1.s390x",
                "product": {
                  "name": "go1.24-1.24.12-160000.1.1.s390x",
                  "product_id": "go1.24-1.24.12-160000.1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "go1.24-doc-1.24.12-160000.1.1.s390x",
                "product": {
                  "name": "go1.24-doc-1.24.12-160000.1.1.s390x",
                  "product_id": "go1.24-doc-1.24.12-160000.1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "go1.24-race-1.24.12-160000.1.1.s390x",
                "product": {
                  "name": "go1.24-race-1.24.12-160000.1.1.s390x",
                  "product_id": "go1.24-race-1.24.12-160000.1.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go1.24-1.24.12-160000.1.1.x86_64",
                "product": {
                  "name": "go1.24-1.24.12-160000.1.1.x86_64",
                  "product_id": "go1.24-1.24.12-160000.1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "go1.24-doc-1.24.12-160000.1.1.x86_64",
                "product": {
                  "name": "go1.24-doc-1.24.12-160000.1.1.x86_64",
                  "product_id": "go1.24-doc-1.24.12-160000.1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
                "product": {
                  "name": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
                  "product_id": "go1.24-libstd-1.24.12-160000.1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "go1.24-race-1.24.12-160000.1.1.x86_64",
                "product": {
                  "name": "go1.24-race-1.24.12-160000.1.1.x86_64",
                  "product_id": "go1.24-race-1.24.12-160000.1.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 16.0",
                "product": {
                  "name": "openSUSE Leap 16.0",
                  "product_id": "openSUSE Leap 16.0"
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.24-1.24.12-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64"
        },
        "product_reference": "go1.24-1.24.12-160000.1.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.24-1.24.12-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le"
        },
        "product_reference": "go1.24-1.24.12-160000.1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.24-1.24.12-160000.1.1.s390x as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x"
        },
        "product_reference": "go1.24-1.24.12-160000.1.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.24-1.24.12-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64"
        },
        "product_reference": "go1.24-1.24.12-160000.1.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.24-doc-1.24.12-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64"
        },
        "product_reference": "go1.24-doc-1.24.12-160000.1.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.24-doc-1.24.12-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le"
        },
        "product_reference": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.24-doc-1.24.12-160000.1.1.s390x as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x"
        },
        "product_reference": "go1.24-doc-1.24.12-160000.1.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.24-doc-1.24.12-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64"
        },
        "product_reference": "go1.24-doc-1.24.12-160000.1.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.24-libstd-1.24.12-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64"
        },
        "product_reference": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.24-libstd-1.24.12-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64"
        },
        "product_reference": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.24-race-1.24.12-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64"
        },
        "product_reference": "go1.24-race-1.24.12-160000.1.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.24-race-1.24.12-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le"
        },
        "product_reference": "go1.24-race-1.24.12-160000.1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.24-race-1.24.12-160000.1.1.s390x as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x"
        },
        "product_reference": "go1.24-race-1.24.12-160000.1.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.24-race-1.24.12-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
        },
        "product_reference": "go1.24-race-1.24.12-160000.1.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-61726",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-61726"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
          "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-61726",
          "url": "https://www.suse.com/security/cve/CVE-2025-61726"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256817 for CVE-2025-61726",
          "url": "https://bugzilla.suse.com/1256817"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-22T12:53:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-61726"
    },
    {
      "cve": "CVE-2025-61728",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-61728"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
          "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-61728",
          "url": "https://www.suse.com/security/cve/CVE-2025-61728"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256816 for CVE-2025-61728",
          "url": "https://bugzilla.suse.com/1256816"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-22T12:53:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-61728"
    },
    {
      "cve": "CVE-2025-61730",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-61730"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
          "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-61730",
          "url": "https://www.suse.com/security/cve/CVE-2025-61730"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256821 for CVE-2025-61730",
          "url": "https://bugzilla.suse.com/1256821"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-22T12:53:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-61730"
    },
    {
      "cve": "CVE-2025-61731",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-61731"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
          "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-61731",
          "url": "https://www.suse.com/security/cve/CVE-2025-61731"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256819 for CVE-2025-61731",
          "url": "https://bugzilla.suse.com/1256819"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-22T12:53:33Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-61731"
    },
    {
      "cve": "CVE-2025-68119",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68119"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
          "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68119",
          "url": "https://www.suse.com/security/cve/CVE-2025-68119"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256820 for CVE-2025-68119",
          "url": "https://bugzilla.suse.com/1256820"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-22T12:53:33Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-68119"
    },
    {
      "cve": "CVE-2025-68121",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68121"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "unknown",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
          "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
          "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
          "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
          "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68121",
          "url": "https://www.suse.com/security/cve/CVE-2025-68121"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256818 for CVE-2025-68121",
          "url": "https://bugzilla.suse.com/1256818"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
            "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-22T12:53:33Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-68121"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…