{"affected":[{"ecosystem_specific":{"binaries":[{"golang-github-prometheus-prometheus":"3.5.0-160000.2.1"}]},"package":{"ecosystem":"openSUSE:Leap 16.0","name":"golang-github-prometheus-prometheus","purl":"pkg:rpm/opensuse/golang-github-prometheus-prometheus&distro=openSUSE%20Leap%2016.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.5.0-160000.2.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for golang-github-prometheus-prometheus fixes the following issues:\n\n- CVE-2026-25547: Fixed an unbounded brace range expansion leading to excessive CPU and memory consumption. (bsc#1257841)\n- CVE-2026-1615: Fixed arbitrary code injection due to unsafe evaluation of user-supplied JSON Path expressions in jsonpath. (bsc#1257897)\n- CVE-2025-61140:  Fixed a function vulnerable to prototype pollution in jsonpath. (bsc#1257442)\n","id":"openSUSE-SU-2026:20239-1","modified":"2026-02-17T09:54:15Z","published":"2026-02-17T09:54:15Z","references":[{"type":"ADVISORY","url":null},{"type":"REPORT","url":"https://bugzilla.suse.com/1257442"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257841"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257897"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-61140"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-1615"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-25547"}],"related":["CVE-2025-61140","CVE-2026-1615","CVE-2026-25547"],"summary":"Security update for golang-github-prometheus-prometheus","upstream":["CVE-2025-61140","CVE-2026-1615","CVE-2026-25547"]}