{"affected":[{"ecosystem_specific":{"binaries":[{"golang-github-prometheus-prometheus":"3.5.0-160000.2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 16.0","name":"golang-github-prometheus-prometheus","purl":"pkg:rpm/suse/golang-github-prometheus-prometheus&distro=SUSE%20Linux%20Enterprise%20Server%2016.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.5.0-160000.2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"golang-github-prometheus-prometheus":"3.5.0-160000.2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP applications 16.0","name":"golang-github-prometheus-prometheus","purl":"pkg:rpm/suse/golang-github-prometheus-prometheus&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20applications%2016.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.5.0-160000.2.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for golang-github-prometheus-prometheus fixes the following issues:\n\n- CVE-2026-25547: Fixed an unbounded brace range expansion leading to excessive CPU and memory consumption. (bsc#1257841)\n- CVE-2026-1615: Fixed arbitrary code injection due to unsafe evaluation of user-supplied JSON Path expressions in jsonpath. (bsc#1257897)\n- CVE-2025-61140:  Fixed a function vulnerable to prototype pollution in jsonpath. (bsc#1257442)\n","id":"SUSE-SU-2026:20574-1","modified":"2026-02-17T09:51:55Z","published":"2026-02-17T09:51:55Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-202620574-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257442"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257841"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257897"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-61140"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-1615"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-25547"}],"related":["CVE-2025-61140","CVE-2026-1615","CVE-2026-25547"],"summary":"Security update for golang-github-prometheus-prometheus","upstream":["CVE-2025-61140","CVE-2026-1615","CVE-2026-25547"]}