<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for go1.24</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2026:20122-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-01-22T12:53:24Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-01-22T12:53:24Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-01-22T12:53:24Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for go1.24</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for go1.24 fixes the following issues:

Update to go1.24.12 (released 2026-01-15) (bsc#1236217)

Security fixes:

 - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).
 - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).
 - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).
 - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).
 - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).
 - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).

Other fixes:

  * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled
  * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes
  * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386
  * go#76796 runtime: race detector crash on ppc64le
  * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling &amp;lt;function&amp;gt;: runtime error: index out of range
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLES-16.0-166</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620122-1/</URL>
      <Description>Link for SUSE-SU-2026:20122-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2026-January/043748.html</URL>
      <Description>E-Mail link for SUSE-SU-2026:20122-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1236217</URL>
      <Description>SUSE Bug 1236217</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256816</URL>
      <Description>SUSE Bug 1256816</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256817</URL>
      <Description>SUSE Bug 1256817</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256818</URL>
      <Description>SUSE Bug 1256818</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256819</URL>
      <Description>SUSE Bug 1256819</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256820</URL>
      <Description>SUSE Bug 1256820</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256821</URL>
      <Description>SUSE Bug 1256821</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61726/</URL>
      <Description>SUSE CVE CVE-2025-61726 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61728/</URL>
      <Description>SUSE CVE CVE-2025-61728 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61730/</URL>
      <Description>SUSE CVE CVE-2025-61730 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61731/</URL>
      <Description>SUSE CVE CVE-2025-61731 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-68119/</URL>
      <Description>SUSE CVE CVE-2025-68119 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-68121/</URL>
      <Description>SUSE CVE CVE-2025-68121 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 16.0">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 16.0">
        <FullProductName ProductID="SUSE Linux Enterprise Server 16.0" CPE="cpe:/o:suse:sles:16:16.0:server">SUSE Linux Enterprise Server 16.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP applications 16.0">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP applications 16.0">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP applications 16.0" CPE="cpe:/o:suse:sles:16:16.0:server-sap">SUSE Linux Enterprise Server for SAP applications 16.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="go1.24-1.24.12-160000.1.1">
      <FullProductName ProductID="go1.24-1.24.12-160000.1.1">go1.24-1.24.12-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.24-doc-1.24.12-160000.1.1">
      <FullProductName ProductID="go1.24-doc-1.24.12-160000.1.1">go1.24-doc-1.24.12-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.24-libstd-1.24.12-160000.1.1">
      <FullProductName ProductID="go1.24-libstd-1.24.12-160000.1.1">go1.24-libstd-1.24.12-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.24-race-1.24.12-160000.1.1">
      <FullProductName ProductID="go1.24-race-1.24.12-160000.1.1">go1.24-race-1.24.12-160000.1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="go1.24-1.24.12-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1">go1.24-1.24.12-160000.1.1 as a component of SUSE Linux Enterprise Server 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-doc-1.24.12-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1">go1.24-doc-1.24.12-160000.1.1 as a component of SUSE Linux Enterprise Server 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-libstd-1.24.12-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1">go1.24-libstd-1.24.12-160000.1.1 as a component of SUSE Linux Enterprise Server 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-race-1.24.12-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1">go1.24-race-1.24.12-160000.1.1 as a component of SUSE Linux Enterprise Server 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-1.24.12-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP applications 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1">go1.24-1.24.12-160000.1.1 as a component of SUSE Linux Enterprise Server for SAP applications 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-doc-1.24.12-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP applications 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1">go1.24-doc-1.24.12-160000.1.1 as a component of SUSE Linux Enterprise Server for SAP applications 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-libstd-1.24.12-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP applications 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1">go1.24-libstd-1.24.12-160000.1.1 as a component of SUSE Linux Enterprise Server for SAP applications 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.24-race-1.24.12-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP applications 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1">go1.24-race-1.24.12-160000.1.1 as a component of SUSE Linux Enterprise Server for SAP applications 16.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.</Note>
    </Notes>
    <CVE>CVE-2025-61726</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620122-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61726.html</URL>
        <Description>CVE-2025-61726</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256817</URL>
        <Description>SUSE Bug 1256817</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.</Note>
    </Notes>
    <CVE>CVE-2025-61728</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620122-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61728.html</URL>
        <Description>CVE-2025-61728</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256816</URL>
        <Description>SUSE Bug 1256816</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.</Note>
    </Notes>
    <CVE>CVE-2025-61730</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620122-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61730.html</URL>
        <Description>CVE-2025-61730</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256821</URL>
        <Description>SUSE Bug 1256821</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a "--log-file" argument to this directive, causing pkg-config to write to an attacker-controlled location.</Note>
    </Notes>
    <CVE>CVE-2025-61731</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620122-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61731.html</URL>
        <Description>CVE-2025-61731</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256819</URL>
        <Description>SUSE Bug 1256819</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.</Note>
    </Notes>
    <CVE>CVE-2025-68119</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620122-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-68119.html</URL>
        <Description>CVE-2025-68119</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256820</URL>
        <Description>SUSE Bug 1256820</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2025-68121</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620122-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-68121.html</URL>
        <Description>CVE-2025-68121</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256818</URL>
        <Description>SUSE Bug 1256818</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
