Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.5
RHEL: golang-github-openprinting-ipp-usb Uncontrolled Memory Allocation
RHSA-2026:3977
Summary
An update is available for the golang-github-openprinting-ipp-usb package on Red Hat Enterprise Linux. This update fixes a security issue that could allow a remote attacker to cause a denial-of-service condition. System administrators should update their systems to the latest version of the package to mitigate potential security risks.
What to do
- Update redhat golang-github-openprinting-ipp-usb to version 0:0.9.27-3.el10_0.2.
- Update redhat golang-github-openprinting-ipp-usb-debugsource to version 0:0.9.27-3.el10_0.2.
- Update redhat ipp-usb to version 0:0.9.27-3.el10_0.2.
- Update redhat ipp-usb-debuginfo to version 0:0.9.27-3.el10_0.2.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | golang-github-openprinting-ipp-usb | <= 0:0.9.27-3.el10_0.2 | 0:0.9.27-3.el10_0.2 |
| redhat | golang-github-openprinting-ipp-usb-debugsource | <= 0:0.9.27-3.el10_0.2 | 0:0.9.27-3.el10_0.2 |
| redhat | ipp-usb | <= 0:0.9.27-3.el10_0.2 | 0:0.9.27-3.el10_0.2 |
| redhat | ipp-usb-debuginfo | <= 0:0.9.27-3.el10_0.2 | 0:0.9.27-3.el10_0.2 |
Original title
Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update
osv CVSS3.1
7.5
- https://access.redhat.com/errata/RHSA-2026:3977 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#important Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2434432 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2437111 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3977.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-61726 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-61726 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-61726 Vendor Advisory
- https://go.dev/cl/736712 Third Party Advisory
- https://go.dev/issue/77101 Third Party Advisory
- https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc Third Party Advisory
- https://pkg.go.dev/vuln/GO-2026-4341 Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-68121 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-68121 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-68121 Vendor Advisory
- https://go.dev/cl/737700 Third Party Advisory
- https://go.dev/issue/77217 Third Party Advisory
- https://groups.google.com/g/golang-announce/c/K09ubi9FQFk Third Party Advisory
- https://pkg.go.dev/vuln/GO-2026-4337 Vendor Advisory
Published: 9 Mar 2026 · Updated: 13 Mar 2026 · First seen: 9 Mar 2026