{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "Update to Go 1.25.7\n- CVE-2025-61726: fixed DoS due to memory exhaustion flaw in net/url parameter\n  parsing\n- CVE-2025-61732: fixed RCE via code smuggling flaw in cgo comment parsing\n- CVE-2025-68121: fixed security bypass in TLS where session resumption\n  could ignore revoked or expired client certificates.\n- CVE-2025-61731: fixed arbitrary code execution vulnerability in the go\n  command toolchain involving unsafe cgo configuration flags.\n- CVE-2025-68119: fixed arbitrary code execution risk when the go tool\n  processes malicious version strings from external source control.\n- CVE-2025-61730: fixed minor information disclosure in TLS 1.3 during\n  specific encrypted handshake message transitions.\n- CVE-2025-61727: fixed certificate validation bypass where specific wildcard\n  domain constraints were not properly enforced by the security library.",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1772124479",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1772124479"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/tuxcare9.6esu/advisories/2026/clsa-2026_1772124479.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-03-02T10:30:50Z",
      "generator": {
        "date": "2026-03-02T10:30:50Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1772124479",
      "initial_release_date": "2026-02-26T16:49:26Z",
      "revision_history": [
        {
          "date": "2026-02-26T16:49:26Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-03-02T10:30:50Z",
          "number": "2",
          "summary": "Update document"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "golang: Fix of 7 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "AlmaLinux 9.6",
                "product": {
                  "name": "AlmaLinux 9.6",
                  "product_id": "AlmaLinux-9.6",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:almalinux:almalinux:9.6:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "AlmaLinux"
          }
        ],
        "category": "vendor",
        "name": "AlmaLinux OS Foundation"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Rocky Linux 9.6",
                "product": {
                  "name": "Rocky Linux 9.6",
                  "product_id": "Rocky Linux-9.6",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:resf:rocky_linux:9.6:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Rocky Linux"
          }
        ],
        "category": "vendor",
        "name": "Rocky Linux"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
                "product": {
                  "name": "golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
                  "product_id": "golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/golang-race@1.25.7-1.el9_6.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
                "product": {
                  "name": "golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
                  "product_id": "golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/golang-bin@1.25.7-1.el9_6.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
                "product": {
                  "name": "go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
                  "product_id": "go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/go-toolset@1.25.7-1.el9_6.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
                "product": {
                  "name": "golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
                  "product_id": "golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/golang@1.25.7-1.el9_6.tuxcare.els1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
                "product": {
                  "name": "golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
                  "product_id": "golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/golang-src@1.25.7-1.el9_6.tuxcare.els1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
                "product": {
                  "name": "golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
                  "product_id": "golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/golang-misc@1.25.7-1.el9_6.tuxcare.els1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
                "product": {
                  "name": "golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
                  "product_id": "golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/golang-docs@1.25.7-1.el9_6.tuxcare.els1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
                "product": {
                  "name": "golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
                  "product_id": "golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/golang-tests@1.25.7-1.el9_6.tuxcare.els1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64"
        },
        "product_reference": "golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64"
        },
        "product_reference": "golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
        },
        "product_reference": "golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64"
        },
        "product_reference": "go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
        },
        "product_reference": "golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
        },
        "product_reference": "golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64"
        },
        "product_reference": "golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
        },
        "product_reference": "golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64"
        },
        "product_reference": "golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64"
        },
        "product_reference": "golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
        },
        "product_reference": "golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64"
        },
        "product_reference": "go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
        },
        "product_reference": "golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
        },
        "product_reference": "golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64"
        },
        "product_reference": "golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
        },
        "product_reference": "golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
        "relates_to_product_reference": "Rocky Linux-9.6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-68121",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "description",
          "text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "AlmaLinux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "AlmaLinux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "AlmaLinux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-68121"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/737700",
          "url": "https://go.dev/cl/737700"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/77217",
          "url": "https://go.dev/issue/77217"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
          "url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2026-4337",
          "url": "https://pkg.go.dev/vuln/GO-2026-4337"
        }
      ],
      "release_date": "2026-02-05T18:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-26T16:48:02.165855Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1772124479",
          "product_ids": [
            "AlmaLinux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1772124479"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 10.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ]
    },
    {
      "cve": "CVE-2025-61731",
      "cwe": {
        "id": "CWE-88",
        "name": "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')"
      },
      "notes": [
        {
          "category": "description",
          "text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "AlmaLinux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "AlmaLinux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "AlmaLinux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-61731"
        }
      ],
      "release_date": "2026-01-28T19:30:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-26T16:48:02.165855Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1772124479",
          "product_ids": [
            "AlmaLinux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1772124479"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-61730",
      "notes": [
        {
          "category": "description",
          "text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
          "title": "Vulnerability description"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "AlmaLinux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "AlmaLinux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "AlmaLinux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-61730"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/724120",
          "url": "https://go.dev/cl/724120"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/76443",
          "url": "https://go.dev/issue/76443"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
          "url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2026-4340",
          "url": "https://pkg.go.dev/vuln/GO-2026-4340"
        }
      ],
      "release_date": "2026-01-28T20:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-26T16:48:02.165855Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1772124479",
          "product_ids": [
            "AlmaLinux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1772124479"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ]
    },
    {
      "cve": "CVE-2025-61727",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "description",
          "text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "AlmaLinux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "AlmaLinux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "AlmaLinux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-61727"
        }
      ],
      "release_date": "2025-12-03T19:37:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-26T16:48:02.165855Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1772124479",
          "product_ids": [
            "AlmaLinux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1772124479"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2025-61732",
      "notes": [
        {
          "category": "description",
          "text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "AlmaLinux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "AlmaLinux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "AlmaLinux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-61732"
        }
      ],
      "release_date": "2026-02-05T03:42:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-26T16:48:02.165855Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1772124479",
          "product_ids": [
            "AlmaLinux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1772124479"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-68119",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')"
      },
      "notes": [
        {
          "category": "description",
          "text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "AlmaLinux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "AlmaLinux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "AlmaLinux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-68119"
        }
      ],
      "release_date": "2026-01-28T19:30:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-26T16:48:02.165855Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1772124479",
          "product_ids": [
            "AlmaLinux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1772124479"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2025-61726",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "description",
          "text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "AlmaLinux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "AlmaLinux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "AlmaLinux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
          "Rocky Linux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-61726"
        }
      ],
      "release_date": "2026-01-28T19:30:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-26T16:48:02.165855Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1772124479",
          "product_ids": [
            "AlmaLinux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1772124479"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "AlmaLinux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:go-toolset-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-bin-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-docs-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-misc-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-race-0:1.25.7-1.el9_6.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:golang-src-0:1.25.7-1.el9_6.tuxcare.els1.noarch",
            "Rocky Linux-9.6:golang-tests-0:1.25.7-1.el9_6.tuxcare.els1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}