Skip to content
This repository was archived by the owner on Jan 7, 2026. It is now read-only.

Commit 83131c4

Browse files
Adding Advisory CVE-2025-61727 for splunk-otel-collector (#27391)
Co-authored-by: octo-sts[bot] <157150467+octo-sts@users.noreply.github.com> Co-authored-by: David Negreira <david.negreira@chainguard.dev>
1 parent 3697e5b commit 83131c4

1 file changed

Lines changed: 18 additions & 0 deletions

File tree

splunk-otel-collector.advisories.yaml

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -357,6 +357,24 @@ advisories:
357357
type: component-vulnerability-mismatch
358358
note: Prometheus ships a Go (Golang) library with a versioning scheme that follows the 0.x format. However, the Prometheus application itself uses a versioning scheme based on 1.x, 2.x, etc. The vulnerability identified in CVE-2019-3826 is specifically associated with the Prometheus application, not the Golang library.
359359

360+
- id: CGA-cx3x-42xv-46vr
361+
aliases:
362+
- CVE-2025-61727
363+
- GHSA-5mh9-3jwc-rp59
364+
events:
365+
- timestamp: 2025-12-06T16:52:56Z
366+
type: detection
367+
data:
368+
type: scan/v1
369+
data:
370+
subpackageName: splunk-otel-collector
371+
componentID: 2d0bc6f91ef05b16
372+
componentName: stdlib
373+
componentVersion: go1.25.4
374+
componentType: go-module
375+
componentLocation: /usr/bin/otelcol
376+
scanner: grype
377+
360378
- id: CGA-g6j5-q5q5-wpr4
361379
aliases:
362380
- CVE-2025-29786

0 commit comments

Comments
 (0)