{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Recommended update for trivy","title":"Title of the patch"},{"category":"description","text":"This update for trivy fixes the following issues:\n\n- Update to version 0.68.2:\n  * release: v0.68.2 [release/v0.68] (#9950)\n  * fix(deps): bump alpine from `3.22.1` to `3.23.0` [backport: release/v0.68] (#9949)\n  * ci: enable `check-latest` for `setup-go` [backport: release/v0.68] (#9946)\n","title":"Description of the patch"},{"category":"details","text":"openSUSE-Leap-16.0-packagehub-63","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/opensuse-ru-2026_20010-1.json"},{"category":"self","summary":"SUSE Bug 1251363","url":"https://bugzilla.suse.com/1251363"},{"category":"self","summary":"SUSE Bug 1251547","url":"https://bugzilla.suse.com/1251547"},{"category":"self","summary":"SUSE Bug 1253512","url":"https://bugzilla.suse.com/1253512"},{"category":"self","summary":"SUSE Bug 1253786","url":"https://bugzilla.suse.com/1253786"},{"category":"self","summary":"SUSE Bug 1253977","url":"https://bugzilla.suse.com/1253977"},{"category":"self","summary":"SUSE CVE CVE-2025-47911 page","url":"https://www.suse.com/security/cve/CVE-2025-47911/"},{"category":"self","summary":"SUSE CVE CVE-2025-47913 page","url":"https://www.suse.com/security/cve/CVE-2025-47913/"},{"category":"self","summary":"SUSE CVE CVE-2025-47914 page","url":"https://www.suse.com/security/cve/CVE-2025-47914/"},{"category":"self","summary":"SUSE CVE CVE-2025-58181 page","url":"https://www.suse.com/security/cve/CVE-2025-58181/"},{"category":"self","summary":"SUSE CVE CVE-2025-58190 page","url":"https://www.suse.com/security/cve/CVE-2025-58190/"}],"title":"Recommended update for trivy","tracking":{"current_release_date":"2026-01-08T14:37:24Z","generator":{"date":"2026-01-08T14:37:24Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"openSUSE-RU-2026:20010-1","initial_release_date":"2026-01-08T14:37:24Z","revision_history":[{"date":"2026-01-08T14:37:24Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"trivy-0.68.2-bp160.1.1.aarch64","product":{"name":"trivy-0.68.2-bp160.1.1.aarch64","product_id":"trivy-0.68.2-bp160.1.1.aarch64"}}],"category":"architecture","name":"aarch64"},{"branches":[{"category":"product_version","name":"trivy-0.68.2-bp160.1.1.ppc64le","product":{"name":"trivy-0.68.2-bp160.1.1.ppc64le","product_id":"trivy-0.68.2-bp160.1.1.ppc64le"}}],"category":"architecture","name":"ppc64le"},{"branches":[{"category":"product_version","name":"trivy-0.68.2-bp160.1.1.s390x","product":{"name":"trivy-0.68.2-bp160.1.1.s390x","product_id":"trivy-0.68.2-bp160.1.1.s390x"}}],"category":"architecture","name":"s390x"},{"branches":[{"category":"product_version","name":"trivy-0.68.2-bp160.1.1.x86_64","product":{"name":"trivy-0.68.2-bp160.1.1.x86_64","product_id":"trivy-0.68.2-bp160.1.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"openSUSE Leap 16.0","product":{"name":"openSUSE Leap 16.0","product_id":"openSUSE Leap 16.0"}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"trivy-0.68.2-bp160.1.1.aarch64 as component of openSUSE Leap 16.0","product_id":"openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.aarch64"},"product_reference":"trivy-0.68.2-bp160.1.1.aarch64","relates_to_product_reference":"openSUSE Leap 16.0"},{"category":"default_component_of","full_product_name":{"name":"trivy-0.68.2-bp160.1.1.ppc64le as component of openSUSE Leap 16.0","product_id":"openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.ppc64le"},"product_reference":"trivy-0.68.2-bp160.1.1.ppc64le","relates_to_product_reference":"openSUSE Leap 16.0"},{"category":"default_component_of","full_product_name":{"name":"trivy-0.68.2-bp160.1.1.s390x as component of openSUSE Leap 16.0","product_id":"openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.s390x"},"product_reference":"trivy-0.68.2-bp160.1.1.s390x","relates_to_product_reference":"openSUSE Leap 16.0"},{"category":"default_component_of","full_product_name":{"name":"trivy-0.68.2-bp160.1.1.x86_64 as component of openSUSE Leap 16.0","product_id":"openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.x86_64"},"product_reference":"trivy-0.68.2-bp160.1.1.x86_64","relates_to_product_reference":"openSUSE Leap 16.0"}]},"vulnerabilities":[{"cve":"CVE-2025-47911","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2025-47911"}],"notes":[{"category":"general","text":"The html.Parse function in golang.org/x/net/html has quadratic parsing complexity when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.aarch64","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.ppc64le","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.s390x","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2025-47911","url":"https://www.suse.com/security/cve/CVE-2025-47911"},{"category":"external","summary":"SUSE Bug 1251308 for CVE-2025-47911","url":"https://bugzilla.suse.com/1251308"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.aarch64","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.ppc64le","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.s390x","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"products":["openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.aarch64","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.ppc64le","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.s390x","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-01-08T14:37:24Z","details":"moderate"}],"title":"CVE-2025-47911"},{"cve":"CVE-2025-47913","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2025-47913"}],"notes":[{"category":"general","text":"SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.aarch64","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.ppc64le","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.s390x","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2025-47913","url":"https://www.suse.com/security/cve/CVE-2025-47913"},{"category":"external","summary":"SUSE Bug 1253506 for CVE-2025-47913","url":"https://bugzilla.suse.com/1253506"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.aarch64","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.ppc64le","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.s390x","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.aarch64","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.ppc64le","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.s390x","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-01-08T14:37:24Z","details":"important"}],"title":"CVE-2025-47913"},{"cve":"CVE-2025-47914","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2025-47914"}],"notes":[{"category":"general","text":"SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.aarch64","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.ppc64le","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.s390x","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2025-47914","url":"https://www.suse.com/security/cve/CVE-2025-47914"},{"category":"external","summary":"SUSE Bug 1253967 for CVE-2025-47914","url":"https://bugzilla.suse.com/1253967"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.aarch64","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.ppc64le","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.s390x","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"products":["openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.aarch64","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.ppc64le","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.s390x","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-01-08T14:37:24Z","details":"moderate"}],"title":"CVE-2025-47914"},{"cve":"CVE-2025-58181","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2025-58181"}],"notes":[{"category":"general","text":"SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.aarch64","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.ppc64le","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.s390x","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2025-58181","url":"https://www.suse.com/security/cve/CVE-2025-58181"},{"category":"external","summary":"SUSE Bug 1253784 for CVE-2025-58181","url":"https://bugzilla.suse.com/1253784"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.aarch64","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.ppc64le","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.s390x","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"products":["openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.aarch64","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.ppc64le","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.s390x","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-01-08T14:37:24Z","details":"moderate"}],"title":"CVE-2025-58181"},{"cve":"CVE-2025-58190","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2025-58190"}],"notes":[{"category":"general","text":"The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.aarch64","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.ppc64le","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.s390x","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2025-58190","url":"https://www.suse.com/security/cve/CVE-2025-58190"},{"category":"external","summary":"SUSE Bug 1251309 for CVE-2025-58190","url":"https://bugzilla.suse.com/1251309"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.aarch64","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.ppc64le","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.s390x","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"products":["openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.aarch64","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.ppc64le","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.s390x","openSUSE Leap 16.0:trivy-0.68.2-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-01-08T14:37:24Z","details":"moderate"}],"title":"CVE-2025-58190"}]}