<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for govulncheck-vulndb</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:02764-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-08-12T12:58:47Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-08-12T12:58:47Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-08-12T12:58:47Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for govulncheck-vulndb</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for govulncheck-vulndb fixes the following issues:

- Update to version 0.0.20250806T202249 2025-08-06T20:22:49Z (jsc#PED-11136)
  * GO-2022-0392 GHSA-m6gx-rhvj-fh52
  * GO-2022-0396 GHSA-g54h-m393-cpwq
  * GO-2022-0452 GHSA-f3fp-gc8g-vw66
  * GO-2022-0456 GHSA-wjxw-gh3m-7pm5
  * GO-2022-0617 GHSA-qh36-44jv-c8xj
  * GO-2022-0703 GHSA-pmqp-h87c-mr78
  * GO-2022-0771 GHSA-69v6-xc2j-r2jf
  * GO-2022-0775 GHSA-v592-xf75-856p
  * GO-2022-0782 GHSA-34jx-wx69-9x8v
  * GO-2022-0802 GHSA-6qfg-8799-r575
  * GO-2022-0814 GHSA-9h4h-8w5p-f28w
  * GO-2022-0835 GHSA-gp4j-w3vj-7299
  * GO-2022-0867 GHSA-qhm4-jxv7-j9pq
  * GO-2022-0871 GHSA-qr2j-wrhx-4829
  * GO-2022-0885 GHSA-wqv3-8cm6-h6wg
  * GO-2022-0886 GHSA-wqwf-x5cj-rg56
  * GO-2022-0890 GHSA-x6mj-w4jf-jmgw
  * GO-2022-0907 GHSA-g42g-737j-qx6j
  * GO-2022-0908 GHSA-mfv7-gq43-w965
  * GO-2022-0910 GHSA-f5f7-6478-qm6p
  * GO-2022-0914 GHSA-c3xm-pvg7-gh7r
  * GO-2022-0983 GHSA-f9jg-8p32-2f55
  * GO-2023-1492 GHSA-2jx2-76rc-2v7v
  * GO-2023-1627 GHSA-vpvm-3wq2-2wvm
  * GO-2023-1628 GHSA-2394-5535-8j88
  * GO-2023-1629 GHSA-jh36-q97c-9928
  * GO-2023-1682 GHSA-m8cg-xc2p-r3fc
  * GO-2023-1683 GHSA-g2j6-57v7-gm8c
  * GO-2023-1864 GHSA-xc8m-28vv-4pjc
  * GO-2023-1891 GHSA-qc2g-gmh6-95p4
  * GO-2023-1892 GHSA-cgcv-5272-97pr
  * GO-2023-1946 GHSA-q4rr-64r9-fwgf
  * GO-2023-1959 GHSA-2jq6-ffph-p4h8
  * GO-2023-1977 GHSA-mm7g-f2gg-cw8g
  * GO-2023-1985 GHSA-2h9c-34v6-3qmr
  * GO-2023-2159 GHSA-35c7-w35f-xwgh
  * GO-2023-2341 GHSA-hq6q-c2x6-hmch
  * GO-2024-2528 GHSA-j86v-2vjr-fg8f
  * GO-2024-2529 GHSA-pm3m-32r3-7mfh
  * GO-2024-2530 GHSA-vjg6-93fv-qv64
  * GO-2024-2753 GHSA-55qj-gj3x-jq9r
  * GO-2024-2754 GHSA-5x96-j797-5qqw
  * GO-2024-2755 GHSA-5xfg-wv98-264m
  * GO-2024-2780 GHSA-r76g-g87f-vw8f
  * GO-2024-2883 GHSA-mh55-gqvf-xfwm
  * GO-2024-2994 GHSA-82m2-cv7p-4m75
  * GO-2024-3110 GHSA-jfvp-7x6p-h2pv
  * GO-2024-3277 GHSA-h7wq-jj8r-qm7p
  * GO-2025-3436 GHSA-q26p-9cq4-7fc2
  * GO-2025-3465 GHSA-jgfp-53c3-624w
  * GO-2025-3507 GHSA-6wxf-7784-62fp
  * GO-2025-3521 GHSA-3wgm-2gw2-vh5m
  * GO-2025-3522 GHSA-vv39-3w5q-974q
  * GO-2025-3547 GHSA-r56h-j38w-hrqq
  * GO-2025-3605 GHSA-7vpp-9cxj-q8gv
  * GO-2025-3645 GHSA-gc2p-g4fg-29vh
  * GO-2025-3774 GHSA-hj2p-8wj8-pfq4
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-2764,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-2764,openSUSE-SLE-15.6-2025-2764</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502764-1/</URL>
      <Description>Link for SUSE-SU-2025:02764-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2025-August/041179.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:02764-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Package Hub 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Package Hub 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP6" CPE="cpe:/o:suse:packagehub:15:sp6">SUSE Linux Enterprise Module for Package Hub 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
  </ProductTree>
</cvrfdoc>
