<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for go1.24-openssl</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2026:0308-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-01-28T08:38:40Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-01-28T08:38:40Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-01-28T08:38:40Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for go1.24-openssl</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for go1.24-openssl fixes the following issues:

Update to version 1.24.12 (released 2026-01-15) (jsc#SLE-18320, bsc#1236217):

Security fixes:

 - CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).
 - CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).
 - CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).
 - CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).
 - CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).
 - CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).
 - CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).
 - CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).
 - CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).
 - CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).
 - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).
 - CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN (bsc#1254430).
 - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).
 - CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).
 - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).
 - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).
 - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).
 - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).

Other fixes:

  * go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets
  * go#74821 cmd/go: 'get toolchain@latest' should ignore release candidates
  * go#75007 os/exec: TestLookPath fails on plan9 after CL 685755
  * go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root
  * go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21
  * go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol
  * go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9
  * go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9
  * go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail
  * go#75538 net/http: internal error: connCount underflow
  * go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn
  * go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value
  * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets
  * go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot
  * go#75951 encoding/pem: regression when decoding blocks with leading garbage
  * go#76028 pem/encoding: malformed line endings can cause panics
  * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores
  * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled
  * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes
  * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386
  * go#76796 runtime: race detector crash on ppc64le
  * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling &amp;lt;function&amp;gt;: runtime error: index out of range
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2026-308,SUSE-SLE-Module-Development-Tools-15-SP7-2026-308,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-308,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-308,openSUSE-SLE-15.6-2026-308</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/</URL>
      <Description>Link for SUSE-SU-2026:0308-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html</URL>
      <Description>E-Mail link for SUSE-SU-2026:0308-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1236217</URL>
      <Description>SUSE Bug 1236217</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245878</URL>
      <Description>SUSE Bug 1245878</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247816</URL>
      <Description>SUSE Bug 1247816</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248082</URL>
      <Description>SUSE Bug 1248082</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1249985</URL>
      <Description>SUSE Bug 1249985</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251253</URL>
      <Description>SUSE Bug 1251253</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251254</URL>
      <Description>SUSE Bug 1251254</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251255</URL>
      <Description>SUSE Bug 1251255</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251256</URL>
      <Description>SUSE Bug 1251256</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251257</URL>
      <Description>SUSE Bug 1251257</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251258</URL>
      <Description>SUSE Bug 1251258</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251259</URL>
      <Description>SUSE Bug 1251259</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251260</URL>
      <Description>SUSE Bug 1251260</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251261</URL>
      <Description>SUSE Bug 1251261</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251262</URL>
      <Description>SUSE Bug 1251262</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1254430</URL>
      <Description>SUSE Bug 1254430</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1254431</URL>
      <Description>SUSE Bug 1254431</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256816</URL>
      <Description>SUSE Bug 1256816</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256817</URL>
      <Description>SUSE Bug 1256817</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256818</URL>
      <Description>SUSE Bug 1256818</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256819</URL>
      <Description>SUSE Bug 1256819</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256820</URL>
      <Description>SUSE Bug 1256820</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256821</URL>
      <Description>SUSE Bug 1256821</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-47912/</URL>
      <Description>SUSE CVE CVE-2025-47912 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58183/</URL>
      <Description>SUSE CVE CVE-2025-58183 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58185/</URL>
      <Description>SUSE CVE CVE-2025-58185 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58186/</URL>
      <Description>SUSE CVE CVE-2025-58186 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58187/</URL>
      <Description>SUSE CVE CVE-2025-58187 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58188/</URL>
      <Description>SUSE CVE CVE-2025-58188 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58189/</URL>
      <Description>SUSE CVE CVE-2025-58189 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61723/</URL>
      <Description>SUSE CVE CVE-2025-61723 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61724/</URL>
      <Description>SUSE CVE CVE-2025-61724 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61725/</URL>
      <Description>SUSE CVE CVE-2025-61725 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61726/</URL>
      <Description>SUSE CVE CVE-2025-61726 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61727/</URL>
      <Description>SUSE CVE CVE-2025-61727 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61728/</URL>
      <Description>SUSE CVE CVE-2025-61728 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61729/</URL>
      <Description>SUSE CVE CVE-2025-61729 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61730/</URL>
      <Description>SUSE CVE CVE-2025-61730 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61731/</URL>
      <Description>SUSE CVE CVE-2025-61731 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-68119/</URL>
      <Description>SUSE CVE CVE-2025-68119 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-68121/</URL>
      <Description>SUSE CVE CVE-2025-68121 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Development Tools 15 SP7">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Development Tools 15 SP7">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Development Tools 15 SP7" CPE="cpe:/o:suse:sle-module-development-tools:15:sp7">SUSE Linux Enterprise Module for Development Tools 15 SP7</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP6-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP6-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP6-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp6">SUSE Linux Enterprise Server 15 SP6-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP6" CPE="cpe:/o:suse:sles_sap:15:sp6">SUSE Linux Enterprise Server for SAP Applications 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="go1.24-openssl-1.24.12-150600.13.15.1">
      <FullProductName ProductID="go1.24-openssl-1.24.12-150600.13.15.1">go1.24-openssl-1.24.12-150600.13.15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.24-openssl-doc-1.24.12-150600.13.15.1">
      <FullProductName ProductID="go1.24-openssl-doc-1.24.12-150600.13.15.1">go1.24-openssl-doc-1.24.12-150600.13.15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.24-openssl-race-1.24.12-150600.13.15.1">
      <FullProductName ProductID="go1.24-openssl-race-1.24.12-150600.13.15.1">go1.24-openssl-race-1.24.12-150600.13.15.1</FullProductName>
    </Branch>
    <Relationship ProductReference="go1.24-openssl-1.24.12-150600.13.15.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Development Tools 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1">go1.24-openssl-1.24.12-150600.13.15.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP7</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-openssl-doc-1.24.12-150600.13.15.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Development Tools 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1">go1.24-openssl-doc-1.24.12-150600.13.15.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP7</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-openssl-race-1.24.12-150600.13.15.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Development Tools 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1">go1.24-openssl-race-1.24.12-150600.13.15.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP7</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-openssl-1.24.12-150600.13.15.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP6-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1">go1.24-openssl-1.24.12-150600.13.15.1 as a component of SUSE Linux Enterprise Server 15 SP6-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-openssl-doc-1.24.12-150600.13.15.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP6-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1">go1.24-openssl-doc-1.24.12-150600.13.15.1 as a component of SUSE Linux Enterprise Server 15 SP6-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-openssl-race-1.24.12-150600.13.15.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP6-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1">go1.24-openssl-race-1.24.12-150600.13.15.1 as a component of SUSE Linux Enterprise Server 15 SP6-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-openssl-1.24.12-150600.13.15.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1">go1.24-openssl-1.24.12-150600.13.15.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-openssl-doc-1.24.12-150600.13.15.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1">go1.24-openssl-doc-1.24.12-150600.13.15.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-openssl-race-1.24.12-150600.13.15.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1">go1.24-openssl-race-1.24.12-150600.13.15.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-openssl-1.24.12-150600.13.15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1">go1.24-openssl-1.24.12-150600.13.15.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-openssl-doc-1.24.12-150600.13.15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1">go1.24-openssl-doc-1.24.12-150600.13.15.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-openssl-race-1.24.12-150600.13.15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1">go1.24-openssl-race-1.24.12-150600.13.15.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: "http://[::1]/". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.</Note>
    </Notes>
    <CVE>CVE-2025-47912</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-47912.html</URL>
        <Description>CVE-2025-47912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251257</URL>
        <Description>SUSE Bug 1251257</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.</Note>
    </Notes>
    <CVE>CVE-2025-58183</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58183.html</URL>
        <Description>CVE-2025-58183</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251261</URL>
        <Description>SUSE Bug 1251261</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.</Note>
    </Notes>
    <CVE>CVE-2025-58185</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58185.html</URL>
        <Description>CVE-2025-58185</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251258</URL>
        <Description>SUSE Bug 1251258</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.</Note>
    </Notes>
    <CVE>CVE-2025-58186</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58186.html</URL>
        <Description>CVE-2025-58186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251259</URL>
        <Description>SUSE Bug 1251259</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.</Note>
    </Notes>
    <CVE>CVE-2025-58187</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58187.html</URL>
        <Description>CVE-2025-58187</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251254</URL>
        <Description>SUSE Bug 1251254</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.</Note>
    </Notes>
    <CVE>CVE-2025-58188</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58188.html</URL>
        <Description>CVE-2025-58188</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251260</URL>
        <Description>SUSE Bug 1251260</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.</Note>
    </Notes>
    <CVE>CVE-2025-58189</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58189.html</URL>
        <Description>CVE-2025-58189</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251255</URL>
        <Description>SUSE Bug 1251255</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.</Note>
    </Notes>
    <CVE>CVE-2025-61723</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61723.html</URL>
        <Description>CVE-2025-61723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251256</URL>
        <Description>SUSE Bug 1251256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.</Note>
    </Notes>
    <CVE>CVE-2025-61724</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61724.html</URL>
        <Description>CVE-2025-61724</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251262</URL>
        <Description>SUSE Bug 1251262</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.</Note>
    </Notes>
    <CVE>CVE-2025-61725</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61725.html</URL>
        <Description>CVE-2025-61725</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251253</URL>
        <Description>SUSE Bug 1251253</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.</Note>
    </Notes>
    <CVE>CVE-2025-61726</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61726.html</URL>
        <Description>CVE-2025-61726</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256817</URL>
        <Description>SUSE Bug 1256817</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.</Note>
    </Notes>
    <CVE>CVE-2025-61727</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61727.html</URL>
        <Description>CVE-2025-61727</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1254430</URL>
        <Description>SUSE Bug 1254430</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.</Note>
    </Notes>
    <CVE>CVE-2025-61728</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61728.html</URL>
        <Description>CVE-2025-61728</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256816</URL>
        <Description>SUSE Bug 1256816</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.</Note>
    </Notes>
    <CVE>CVE-2025-61729</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61729.html</URL>
        <Description>CVE-2025-61729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1254431</URL>
        <Description>SUSE Bug 1254431</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.</Note>
    </Notes>
    <CVE>CVE-2025-61730</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61730.html</URL>
        <Description>CVE-2025-61730</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256821</URL>
        <Description>SUSE Bug 1256821</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a "--log-file" argument to this directive, causing pkg-config to write to an attacker-controlled location.</Note>
    </Notes>
    <CVE>CVE-2025-61731</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61731.html</URL>
        <Description>CVE-2025-61731</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256819</URL>
        <Description>SUSE Bug 1256819</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.</Note>
    </Notes>
    <CVE>CVE-2025-68119</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-68119.html</URL>
        <Description>CVE-2025-68119</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256820</URL>
        <Description>SUSE Bug 1256820</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2025-68121</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1</ProductID>
        <ProductID>openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-68121.html</URL>
        <Description>CVE-2025-68121</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256818</URL>
        <Description>SUSE Bug 1256818</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
