{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2025-22891","title":"Title"},{"category":"description","text":"When BIG-IP PEM Control Plane listener Virtual Server is configured with Diameter Endpoint profile, undisclosed traffic can cause the Virtual Server to stop processing new client connections and an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2025-22891","url":"https://www.suse.com/security/cve/CVE-2025-22891"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"}],"title":"SUSE CVE CVE-2025-22891","tracking":{"current_release_date":"2026-03-05T07:26:42Z","generator":{"date":"2026-03-05T07:26:42Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2025-22891","initial_release_date":"2026-03-05T07:26:42Z","revision_history":[{"date":"2026-03-05T07:26:42Z","number":"2","summary":"vulnerabilities added,references added,severity changed from  to important"}],"status":"interim","version":"2"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}},{"category":"product_version","name":"gosec-2.24.0-1.1","product":{"name":"gosec-2.24.0-1.1","product_id":"gosec-2.24.0-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/gosec@2.24.0-1.1"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"gosec-2.24.0-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:gosec-2.24.0-1.1"},"product_reference":"gosec-2.24.0-1.1","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2025-22891","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2025-22891"}],"notes":[{"category":"general","text":"When BIG-IP PEM Control Plane listener Virtual Server is configured with Diameter Endpoint profile, undisclosed traffic can cause the Virtual Server to stop processing new client connections and an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:gosec-2.24.0-1.1"]},"references":[{"category":"external","summary":"CVE-2025-22891","url":"https://www.suse.com/security/cve/CVE-2025-22891"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:gosec-2.24.0-1.1"]}],"threats":[{"category":"impact","date":"2025-02-05T19:07:07Z","details":"important"}],"title":"CVE-2025-22891"}]}