Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-0928 (GCVE-0-2025-0928)
Vulnerability from cvelistv5
- CWE-285 - Improper Authorization
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0928", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-08T17:35:31.515571Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-08T17:36:20.075Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://juju.is/", "defaultStatus": "unaffected", "packageName": "juju", "platforms": [ "Linux" ], "product": "Juju", "repo": "https://github.com/juju/juju", "vendor": "Canonical", "versions": [ { "lessThan": "2.9.52", "status": "affected", "version": "2.0.0", "versionType": "semver" }, { "lessThan": "3.6.8", "status": "affected", "version": "3.0.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution." } ], "value": "In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution." } ], "impacts": [ { "descriptions": [ { "lang": "en", "value": "A malicious agent binary could be leveraged to achieve remote code execution on newly provisioned or upgraded machines." } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285: Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-08T17:20:04.608Z", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "url": "https://github.com/juju/juju/security/advisories/GHSA-4vc8-wvhw-m5gv" } ], "source": { "discovery": "INTERNAL" }, "title": "Arbitrary executable upload via authenticated endpoint" } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2025-0928", "datePublished": "2025-07-08T17:20:04.608Z", "dateReserved": "2025-01-31T10:43:45.458Z", "dateUpdated": "2025-07-08T17:36:20.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-0928\",\"sourceIdentifier\":\"security@ubuntu.com\",\"published\":\"2025-07-08T18:15:26.767\",\"lastModified\":\"2025-07-10T13:18:53.830\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution.\"},{\"lang\":\"es\",\"value\":\"En versiones de Juju anteriores a la 3.6.8 y la 2.9.52, cualquier usuario autenticado del controlador pod\u00eda cargar binarios arbitrarios del agente en cualquier modelo o en el propio controlador, sin verificar la pertenencia al modelo ni requerir permisos expl\u00edcitos. Esto permit\u00eda la distribuci\u00f3n de binarios envenenados a equipos nuevos o actualizados, lo que pod\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@ubuntu.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security@ubuntu.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-285\"}]}],\"references\":[{\"url\":\"https://github.com/juju/juju/security/advisories/GHSA-4vc8-wvhw-m5gv\",\"source\":\"security@ubuntu.com\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-0928\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-08T17:35:31.515571Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-08T17:35:34.900Z\"}}], \"cna\": {\"title\": \"Arbitrary executable upload via authenticated endpoint\", \"source\": {\"discovery\": \"INTERNAL\"}, \"impacts\": [{\"descriptions\": [{\"lang\": \"en\", \"value\": \"A malicious agent binary could be leveraged to achieve remote code execution on newly provisioned or upgraded machines.\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://github.com/juju/juju\", \"vendor\": \"Canonical\", \"product\": \"Juju\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.0.0\", \"lessThan\": \"2.9.52\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.6.8\", \"versionType\": \"semver\"}], \"platforms\": [\"Linux\"], \"packageName\": \"juju\", \"collectionURL\": \"https://juju.is/\", \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://github.com/juju/juju/security/advisories/GHSA-4vc8-wvhw-m5gv\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-285\", \"description\": \"CWE-285: Improper Authorization\"}]}], \"providerMetadata\": {\"orgId\": \"cc1ad9ee-3454-478d-9317-d3e869d708bc\", \"shortName\": \"canonical\", \"dateUpdated\": \"2025-07-08T17:20:04.608Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-0928\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-08T17:36:20.075Z\", \"dateReserved\": \"2025-01-31T10:43:45.458Z\", \"assignerOrgId\": \"cc1ad9ee-3454-478d-9317-d3e869d708bc\", \"datePublished\": \"2025-07-08T17:20:04.608Z\", \"assignerShortName\": \"canonical\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
opensuse-su-2025:15405-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "govulncheck-vulndb-0.0.20250730T213748-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the govulncheck-vulndb-0.0.20250730T213748-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15405", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15405-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2024-44905 page", "url": "https://www.suse.com/security/cve/CVE-2024-44905/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-44906 page", "url": "https://www.suse.com/security/cve/CVE-2024-44906/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56731 page", "url": "https://www.suse.com/security/cve/CVE-2024-56731/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-0928 page", "url": "https://www.suse.com/security/cve/CVE-2025-0928/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-1088 page", "url": "https://www.suse.com/security/cve/CVE-2025-1088/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-30086 page", "url": "https://www.suse.com/security/cve/CVE-2025-30086/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-32019 page", "url": "https://www.suse.com/security/cve/CVE-2025-32019/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-3227 page", "url": "https://www.suse.com/security/cve/CVE-2025-3227/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-3228 page", "url": "https://www.suse.com/security/cve/CVE-2025-3228/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-3415 page", "url": "https://www.suse.com/security/cve/CVE-2025-3415/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4563 page", "url": "https://www.suse.com/security/cve/CVE-2025-4563/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4656 page", "url": "https://www.suse.com/security/cve/CVE-2025-4656/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-46702 page", "url": "https://www.suse.com/security/cve/CVE-2025-46702/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4674 page", "url": "https://www.suse.com/security/cve/CVE-2025-4674/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47281 page", "url": "https://www.suse.com/security/cve/CVE-2025-47281/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47871 page", "url": "https://www.suse.com/security/cve/CVE-2025-47871/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47943 page", "url": "https://www.suse.com/security/cve/CVE-2025-47943/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4922 page", "url": "https://www.suse.com/security/cve/CVE-2025-4922/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4981 page", "url": "https://www.suse.com/security/cve/CVE-2025-4981/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-49825 page", "url": "https://www.suse.com/security/cve/CVE-2025-49825/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-5030 page", "url": "https://www.suse.com/security/cve/CVE-2025-5030/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-51471 page", "url": "https://www.suse.com/security/cve/CVE-2025-51471/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52477 page", "url": "https://www.suse.com/security/cve/CVE-2025-52477/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52889 page", "url": "https://www.suse.com/security/cve/CVE-2025-52889/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52890 page", "url": "https://www.suse.com/security/cve/CVE-2025-52890/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52893 page", "url": "https://www.suse.com/security/cve/CVE-2025-52893/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52894 page", "url": "https://www.suse.com/security/cve/CVE-2025-52894/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52900 page", "url": "https://www.suse.com/security/cve/CVE-2025-52900/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52901 page", "url": "https://www.suse.com/security/cve/CVE-2025-52901/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52902 page", "url": "https://www.suse.com/security/cve/CVE-2025-52902/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52903 page", "url": "https://www.suse.com/security/cve/CVE-2025-52903/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52904 page", "url": "https://www.suse.com/security/cve/CVE-2025-52904/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52995 page", "url": "https://www.suse.com/security/cve/CVE-2025-52995/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52996 page", "url": "https://www.suse.com/security/cve/CVE-2025-52996/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52997 page", "url": "https://www.suse.com/security/cve/CVE-2025-52997/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53512 page", "url": "https://www.suse.com/security/cve/CVE-2025-53512/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53513 page", "url": "https://www.suse.com/security/cve/CVE-2025-53513/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53547 page", "url": "https://www.suse.com/security/cve/CVE-2025-53547/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53632 page", "url": "https://www.suse.com/security/cve/CVE-2025-53632/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53633 page", "url": "https://www.suse.com/security/cve/CVE-2025-53633/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53634 page", "url": "https://www.suse.com/security/cve/CVE-2025-53634/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53826 page", "url": "https://www.suse.com/security/cve/CVE-2025-53826/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53893 page", "url": "https://www.suse.com/security/cve/CVE-2025-53893/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53945 page", "url": "https://www.suse.com/security/cve/CVE-2025-53945/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-54059 page", "url": "https://www.suse.com/security/cve/CVE-2025-54059/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-54379 page", "url": "https://www.suse.com/security/cve/CVE-2025-54379/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-5689 page", "url": "https://www.suse.com/security/cve/CVE-2025-5689/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-5981 page", "url": "https://www.suse.com/security/cve/CVE-2025-5981/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6023 page", "url": "https://www.suse.com/security/cve/CVE-2025-6023/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6032 page", "url": "https://www.suse.com/security/cve/CVE-2025-6032/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6224 page", "url": "https://www.suse.com/security/cve/CVE-2025-6224/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6226 page", "url": "https://www.suse.com/security/cve/CVE-2025-6226/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6227 page", "url": "https://www.suse.com/security/cve/CVE-2025-6227/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6233 page", "url": "https://www.suse.com/security/cve/CVE-2025-6233/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6264 page", "url": "https://www.suse.com/security/cve/CVE-2025-6264/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6624 page", "url": "https://www.suse.com/security/cve/CVE-2025-6624/" } ], "title": "govulncheck-vulndb-0.0.20250730T213748-1.1 on GA media", "tracking": { "current_release_date": "2025-08-04T00:00:00Z", "generator": { "date": "2025-08-04T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15405-1", "initial_release_date": "2025-08-04T00:00:00Z", "revision_history": [ { "date": "2025-08-04T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "product": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "product_id": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "product": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "product_id": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "product": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "product_id": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64", "product": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64", "product_id": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64" }, "product_reference": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le" }, "product_reference": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x" }, "product_reference": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" }, "product_reference": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-44905", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-44905" } ], "notes": [ { "category": "general", "text": "go-pg pg v10.13.0 was discovered to contain a SQL injection vulnerability via the component /types/append_value.go.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-44905", "url": "https://www.suse.com/security/cve/CVE-2024-44905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-44905" }, { "cve": "CVE-2024-44906", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-44906" } ], "notes": [ { "category": "general", "text": "uptrace pgdriver v1.2.1 was discovered to contain a SQL injection vulnerability via the appendArg function in /pgdriver/format.go. The maintainer has stated that the issue is fixed in v1.2.15.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-44906", "url": "https://www.suse.com/security/cve/CVE-2024-44906" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-44906" }, { "cve": "CVE-2024-56731", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56731" } ], "notes": [ { "category": "general", "text": "Gogs is an open source self-hosted Git service. Prior to version 0.13.3, it\u0027s still possible to delete files under the .git directory and achieve remote command execution due to an insufficient patch for CVE-2024-39931. Unprivileged user accounts can execute arbitrary commands on the Gogs instance with the privileges of the account specified by RUN_USER in the configuration. Allowing attackers to access and alter any users\u0027 code hosted on the same instance. This issue has been patched in version 0.13.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56731", "url": "https://www.suse.com/security/cve/CVE-2024-56731" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "critical" } ], "title": "CVE-2024-56731" }, { "cve": "CVE-2025-0928", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-0928" } ], "notes": [ { "category": "general", "text": "In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-0928", "url": "https://www.suse.com/security/cve/CVE-2025-0928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-0928" }, { "cve": "CVE-2025-1088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-1088" } ], "notes": [ { "category": "general", "text": "In Grafana, an excessively long dashboard title or panel name will cause Chromium browsers to become unresponsive due to Improper Input Validation vulnerability in Grafana.\nThis issue affects Grafana: before 11.6.2 and is fixed in 11.6.2 and higher.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-1088", "url": "https://www.suse.com/security/cve/CVE-2025-1088" }, { "category": "external", "summary": "SUSE Bug 1245224 for CVE-2025-1088", "url": "https://bugzilla.suse.com/1245224" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-1088" }, { "cve": "CVE-2025-30086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-30086" } ], "notes": [ { "category": "general", "text": "CNCF Harbor 2.13.x before 2.13.1 and 2.12.x before 2.12.4 allows information disclosure by administrators who can exploit an ORM Leak present in the /api/v2.0/users endpoint to leak users\u0027 password hash and salt values. The q URL parameter allows a user to filter users by any column, and filter password=~ could be abused to leak out a user\u0027s password hash character by character. An attacker with administrator access could exploit this to leak highly sensitive information stored in the Harbor database. All endpoints that support the q URL parameter are vulnerable to this ORM leak attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-30086", "url": "https://www.suse.com/security/cve/CVE-2025-30086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-30086" }, { "cve": "CVE-2025-32019", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-32019" } ], "notes": [ { "category": "general", "text": "Harbor is an open source trusted cloud native registry project that stores, signs, and scans content. Versions 2.11.2 and below, as well as versions 2.12.0-rc1 and 2.13.0-rc1, contain a vulnerability where the markdown field in the info tab page can be exploited to inject XSS code. This is fixed in versions 2.11.3 and 2.12.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-32019", "url": "https://www.suse.com/security/cve/CVE-2025-32019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-32019" }, { "cve": "CVE-2025-3227", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-3227" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to properly enforce channel member management permissions in playbook runs, allowing authenticated users without the \u0027Manage Channel Members\u0027 permission to add or remove users from public and private channels by manipulating playbook run participants when the run is linked to a channel.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-3227", "url": "https://www.suse.com/security/cve/CVE-2025-3227" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-3227" }, { "cve": "CVE-2025-3228", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-3228" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to properly retrieve requestorInfo from playbooks handler for guest users which allows an attacker access to the playbook run.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-3228", "url": "https://www.suse.com/security/cve/CVE-2025-3228" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-3228" }, { "cve": "CVE-2025-3415", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-3415" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. \nFixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-3415", "url": "https://www.suse.com/security/cve/CVE-2025-3415" }, { "category": "external", "summary": "SUSE Bug 1245302 for CVE-2025-3415", "url": "https://bugzilla.suse.com/1245302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-3415" }, { "cve": "CVE-2025-4563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4563" } ], "notes": [ { "category": "general", "text": "A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4563", "url": "https://www.suse.com/security/cve/CVE-2025-4563" }, { "category": "external", "summary": "SUSE Bug 1245185 for CVE-2025-4563", "url": "https://bugzilla.suse.com/1245185" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-4563" }, { "cve": "CVE-2025-4656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4656" } ], "notes": [ { "category": "general", "text": "Vault Community and Vault Enterprise rekey and recovery key operations can lead to a denial of service due to uncontrolled cancellation by a Vault operator. This vulnerability (CVE-2025-4656) has been remediated in Vault Community Edition 1.20.0 and Vault Enterprise 1.20.0, 1.19.6, 1.18.11, 1.17.17, and 1.16.22.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4656", "url": "https://www.suse.com/security/cve/CVE-2025-4656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "low" } ], "title": "CVE-2025-4656" }, { "cve": "CVE-2025-46702", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-46702" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to properly enforce channel member management permissions when adding participants to playbook runs. This allows authenticated users with member-level permissions to bypass system admin restrictions and add or remove users to/from private channels via the playbook run participants feature, even when the \u0027Manage Members\u0027 permission has been explicitly removed. This can lead to unauthorized access to sensitive channel content and allow guest users to gain channel management privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-46702", "url": "https://www.suse.com/security/cve/CVE-2025-46702" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-46702" }, { "cve": "CVE-2025-4674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4674" } ], "notes": [ { "category": "general", "text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4674", "url": "https://www.suse.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "SUSE Bug 1246118 for CVE-2025-4674", "url": "https://bugzilla.suse.com/1246118" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-4674" }, { "cve": "CVE-2025-47281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47281" } ], "notes": [ { "category": "general", "text": "Kyverno is a policy engine designed for cloud native platform engineering teams. In versions 1.14.1 and below, a Denial of Service (DoS) vulnerability exists due to improper handling of JMESPath variable substitutions. Attackers with permissions to create or update Kyverno policies can craft expressions using the {{@}} variable combined with a pipe and an invalid JMESPath function (e.g., {{@ | non_existent_function }}). This leads to a nil value being substituted into the policy structure. Subsequent processing by internal functions, specifically getValueAsStringMap, which expect string values, results in a panic due to a type assertion failure (interface {} is nil, not string). This crashes Kyverno worker threads in the admission controller and causes continuous crashes of the reports controller pod. This is fixed in version 1.14.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47281", "url": "https://www.suse.com/security/cve/CVE-2025-47281" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-47281" }, { "cve": "CVE-2025-47871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47871" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to properly validate channel membership when retrieving playbook run metadata, allowing authenticated users who are playbook members but not channel members to access sensitive information about linked private channels including channel name, display name, and participant count through the run metadata API endpoint.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47871", "url": "https://www.suse.com/security/cve/CVE-2025-47871" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-47871" }, { "cve": "CVE-2025-47943", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47943" } ], "notes": [ { "category": "general", "text": "Gogs is an open source self-hosted Git service. In application version 0.14.0+dev and prior, there is a stored cross-site scripting (XSS) vulnerability present in Gogs, which allows client-side Javascript code execution. The vulnerability is caused by the usage of a vulnerable and outdated component: pdfjs-1.4.20 under public/plugins/. This issue has been fixed for gogs.io/gogs in version 0.13.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47943", "url": "https://www.suse.com/security/cve/CVE-2025-47943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-47943" }, { "cve": "CVE-2025-4922", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4922" } ], "notes": [ { "category": "general", "text": "Nomad Community and Nomad Enterprise (\"Nomad\") prefix-based ACL policy lookup can lead to incorrect rule application and shadowing. This vulnerability, identified as CVE-2025-4922, is fixed in Nomad Community Edition 1.10.2 and Nomad Enterprise 1.10.2, 1.9.10, and 1.8.14.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4922", "url": "https://www.suse.com/security/cve/CVE-2025-4922" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-4922" }, { "cve": "CVE-2025-4981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4981" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to sanitize filenames in the archive extractor which allows authenticated users to write files to arbitrary locations on the filesystem via uploading archives with path traversal sequences in filenames, potentially leading to remote code execution. The vulnerability impacts instances where file uploads and document search by content is enabled (FileSettings.EnableFileAttachments = true and FileSettings.ExtractContent = true). These configuration settings are enabled by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4981", "url": "https://www.suse.com/security/cve/CVE-2025-4981" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "critical" } ], "title": "CVE-2025-4981" }, { "cve": "CVE-2025-49825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-49825" } ], "notes": [ { "category": "general", "text": "Teleport provides connectivity, authentication, access controls and audit for infrastructure. Community Edition versions before and including 17.5.1 are vulnerable to remote authentication bypass. At time of posting, there is no available open-source patch.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-49825", "url": "https://www.suse.com/security/cve/CVE-2025-49825" }, { "category": "external", "summary": "SUSE Bug 1244718 for CVE-2025-49825", "url": "https://bugzilla.suse.com/1244718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "critical" } ], "title": "CVE-2025-49825" }, { "cve": "CVE-2025-5030", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-5030" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Ackites KillWxapkg up to 2.4.1. It has been declared as critical. This vulnerability affects the function processFile of the file internal/unpack/unpack.go of the component wxapkg File Parser. The manipulation leads to os command injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-5030", "url": "https://www.suse.com/security/cve/CVE-2025-5030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-5030" }, { "cve": "CVE-2025-51471", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-51471" } ], "notes": [ { "category": "general", "text": "Cross-Domain Token Exposure in server.auth.getAuthorizationToken in Ollama 0.6.7 allows remote attackers to steal authentication tokens and bypass access controls via a malicious realm value in a WWW-Authenticate header returned by the /api/pull endpoint.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-51471", "url": "https://www.suse.com/security/cve/CVE-2025-51471" }, { "category": "external", "summary": "SUSE Bug 1246915 for CVE-2025-51471", "url": "https://bugzilla.suse.com/1246915" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-51471" }, { "cve": "CVE-2025-52477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52477" } ], "notes": [ { "category": "general", "text": "Octo-STS is a GitHub App that acts like a Security Token Service (STS) for the GitHub API. Octo-STS versions before v0.5.3 are vulnerable to unauthenticated SSRF by abusing fields in OpenID Connect tokens. Malicious tokens were shown to trigger internal network requests which could reflect error logs with sensitive information. Upgrade to v0.5.3 to resolve this issue. This version includes patch sets to sanitize input and redact logging.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52477", "url": "https://www.suse.com/security/cve/CVE-2025-52477" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52477" }, { "cve": "CVE-2025-52889", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52889" } ], "notes": [ { "category": "general", "text": "Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus version 6.12 and 6.13 generates nftables rules for local services (DHCP, DNS...) that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to DHCP pool exhaustion and opens the door for other attacks. A patch is available at commit 2516fb19ad8428454cb4edfe70c0a5f0dc1da214.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52889", "url": "https://www.suse.com/security/cve/CVE-2025-52889" }, { "category": "external", "summary": "SUSE Bug 1245365 for CVE-2025-52889", "url": "https://bugzilla.suse.com/1245365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52889" }, { "cve": "CVE-2025-52890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52890" } ], "notes": [ { "category": "general", "text": "Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus versions 6.12 and 6.13generates nftables rules that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to ARP spoofing on the bridge and to fully spoof another VM/container on the same bridge. Commit 254dfd2483ab8de39b47c2258b7f1cf0759231c8 contains a patch for the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52890", "url": "https://www.suse.com/security/cve/CVE-2025-52890" }, { "category": "external", "summary": "SUSE Bug 1245367 for CVE-2025-52890", "url": "https://bugzilla.suse.com/1245367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52890" }, { "cve": "CVE-2025-52893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52893" } ], "notes": [ { "category": "general", "text": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 may leak sensitive information in logs when processing malformed data. This is separate from the earlier HCSEC-2025-09 / CVE-2025-4166. This issue has been fixed in OpenBao v2.3.0 and later. Like with HCSEC-2025-09, there is no known workaround except to ensure properly formatted requests from all clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52893", "url": "https://www.suse.com/security/cve/CVE-2025-52893" }, { "category": "external", "summary": "SUSE Bug 1245381 for CVE-2025-52893", "url": "https://bugzilla.suse.com/1245381" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52893" }, { "cve": "CVE-2025-52894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52894" } ], "notes": [ { "category": "general", "text": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 allowed an attacker to perform unauthenticated, unaudited cancellation of root rekey and recovery rekey operations, effecting a denial of service. In OpenBao v2.2.0 and later, manually setting the configuration option `disable_unauthed_rekey_endpoints=true` allows an operator to deny these rarely-used endpoints on global listeners. A patch is available at commit fe75468822a22a88318c6079425357a02ae5b77b. In a future OpenBao release communicated on OpenBao\u0027s website, the maintainers will set this to `true` for all users and provide an authenticated alternative. As a workaround, if an active proxy or load balancer sits in front of OpenBao, an operator can deny requests to these endpoints from unauthorized IP ranges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52894", "url": "https://www.suse.com/security/cve/CVE-2025-52894" }, { "category": "external", "summary": "SUSE Bug 1245389 for CVE-2025-52894", "url": "https://bugzilla.suse.com/1245389" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52894" }, { "cve": "CVE-2025-52900", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52900" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. The file access permissions for files uploaded to or created from File Browser are never explicitly set by the application. The same is true for the database used by File Browser. On standard servers using File Browser prior to version 2.33.7 where the umask configuration has not been hardened before, this makes all the stated files readable by any operating system account. Version 2.33.7 fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52900", "url": "https://www.suse.com/security/cve/CVE-2025-52900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52900" }, { "cve": "CVE-2025-52901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52901" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.33.9, access tokens are used as GET parameters. The JSON Web Token (JWT) which is used as a session identifier will get leaked to anyone having access to the URLs accessed by the user. This will give an attacker full access to a user\u0027s account and, in consequence, to all sensitive files the user has access to. This issue has been patched in version 2.33.9.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52901", "url": "https://www.suse.com/security/cve/CVE-2025-52901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52901" }, { "cve": "CVE-2025-52902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52902" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. The Markdown preview function of File Browser prior to v2.33.7 is vulnerable to Stored Cross-Site-Scripting (XSS). Any JavaScript code that is part of a Markdown file uploaded by a user will be executed by the browser. Version 2.33.7 contains a fix for the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52902", "url": "https://www.suse.com/security/cve/CVE-2025-52902" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52902" }, { "cve": "CVE-2025-52903", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52903" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In version 2.32.0, the Command Execution feature of File Browser only allows the execution of shell command which have been predefined on a user-specific allowlist. Many tools allow the execution of arbitrary different commands, rendering this limitation void. The concrete impact depends on the commands being granted to the attacker, but the large number of standard commands allowing the execution of subcommands makes it likely that every user having the `Execute commands` permissions can exploit this vulnerability. Everyone who can exploit it will have full code execution rights with the uid of the server process. Until this issue is fixed, the maintainers recommend to completely disable `Execute commands` for all accounts. Since the command execution is an inherently dangerous feature that is not used by all deployments, it should be possible to completely disable it in the application\u0027s configuration. As a defense-in-depth measure, organizations not requiring command execution should operate the Filebrowser from a distroless container image. A patch version has been pushed to disable the feature for all existent installations, and making it opt-in. A warning has been added to the documentation and is printed on the console if the feature is enabled. Due to the project being in maintenance-only mode, the bug has not been fixed. The fix is tracked on pull request 5199.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52903", "url": "https://www.suse.com/security/cve/CVE-2025-52903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52903" }, { "cve": "CVE-2025-52904", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52904" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In version 2.32.0 of the web application, all users have a scope assigned, and they only have access to the files within that scope. The Command Execution feature of Filebrowser allows the execution of shell commands which are not restricted to the scope, potentially giving an attacker read and write access to all files managed by the server. Until this issue is fixed, the maintainers recommend to completely disable `Execute commands` for all accounts. Since the command execution is an inherently dangerous feature that is not used by all deployments, it should be possible to completely disable it in the application\u0027s configuration. As a defense-in-depth measure, organizations not requiring command execution should operate the Filebrowser from a distroless container image. A patch version has been pushed to disable the feature for all existent installations, and making it opt-in. A warning has been added to the documentation and is printed on the console if the feature is enabled. Due to the project being in maintenance-only mode, the bug has not been fixed. Fix is tracked on pull request 5199.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52904", "url": "https://www.suse.com/security/cve/CVE-2025-52904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52904" }, { "cve": "CVE-2025-52995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52995" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.33.10, the implementation of the allowlist is erroneous, allowing a user to execute more shell commands than they are authorized for. The concrete impact of this vulnerability depends on the commands configured, and the binaries installed on the server or in the container image. Due to the missing separation of scopes on the OS-level, this could give an attacker access to all files managed the application, including the File Browser database. This issue has been patched in version 2.33.10.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52995", "url": "https://www.suse.com/security/cve/CVE-2025-52995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52995" }, { "cve": "CVE-2025-52996", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52996" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In versions 2.32.0 and prior, the implementation of password protected links is error-prone, resulting in potential unprotected sharing of a file through a direct download link. This link can either be shared unknowingly by a user or discovered from various locations such as the browser history or the log of a proxy server used. At time of publication, no known patched versions are available.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52996", "url": "https://www.suse.com/security/cve/CVE-2025-52996" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52996" }, { "cve": "CVE-2025-52997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52997" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.34.1, a missing password policy and brute-force protection makes the authentication process insecure. Attackers could mount a brute-force attack to retrieve the passwords of all accounts in a given instance. This issue has been patched in version 2.34.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52997", "url": "https://www.suse.com/security/cve/CVE-2025-52997" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52997" }, { "cve": "CVE-2025-53512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53512" } ], "notes": [ { "category": "general", "text": "The /log endpoint on a Juju controller lacked sufficient authorization checks, allowing unauthorized users to access debug messages that could contain sensitive information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53512", "url": "https://www.suse.com/security/cve/CVE-2025-53512" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-53512" }, { "cve": "CVE-2025-53513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53513" } ], "notes": [ { "category": "general", "text": "The /charms endpoint on a Juju controller lacked sufficient authorization checks, allowing any user with an account on the controller to upload a charm. Uploading a malicious charm that exploits a Zip Slip vulnerability could allow an attacker to gain access to a machine running a unit through the affected charm.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53513", "url": "https://www.suse.com/security/cve/CVE-2025-53513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53513" }, { "cve": "CVE-2025-53547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53547" } ], "notes": [ { "category": "general", "text": "Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53547", "url": "https://www.suse.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "SUSE Bug 1246150 for CVE-2025-53547", "url": "https://bugzilla.suse.com/1246150" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53547" }, { "cve": "CVE-2025-53632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53632" } ], "notes": [ { "category": "general", "text": "Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. When decoding a scenario (i.e. a zip archive), the path of the file to write is not checked, potentially leading to zip slips. Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 47d188f and shipped in v0.1.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53632", "url": "https://www.suse.com/security/cve/CVE-2025-53632" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53632" }, { "cve": "CVE-2025-53633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53633" } ], "notes": [ { "category": "general", "text": "Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. When decoding a scenario (i.e. a zip archive), the size of the decoded content is not checked, potentially leading to zip bombs decompression. Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 14042aa and shipped in v0.1.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53633", "url": "https://www.suse.com/security/cve/CVE-2025-53633" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53633" }, { "cve": "CVE-2025-53634", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53634" } ], "notes": [ { "category": "general", "text": "Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. The HTTP Gateway processes headers, but with no timeout set. With a slow loris attack, an attacker could cause Denial of Service (DoS). Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 1385bd8 and shipped in v0.1.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53634", "url": "https://www.suse.com/security/cve/CVE-2025-53634" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53634" }, { "cve": "CVE-2025-53826", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53826" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename, and edit files. In version 2.39.0, File Browser\u0027s authentication system issues long-lived JWT tokens that remain valid even after the user logs out. As of time of publication, no known patches exist.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53826", "url": "https://www.suse.com/security/cve/CVE-2025-53826" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53826" }, { "cve": "CVE-2025-53893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53893" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename, and edit files. In version 2.38.0, a Denial of Service (DoS) vulnerability exists in the file processing logic when reading a file on endpoint `Filebrowser-Server-IP:PORT/files/{file-name}` . While the server correctly handles and stores uploaded files, it attempts to load the entire content into memory during read operations without size checks or resource limits. This allows an authenticated user to upload a large file and trigger uncontrolled memory consumption on read, potentially crashing the server and making it unresponsive. As of time of publication, no known patches are available.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53893", "url": "https://www.suse.com/security/cve/CVE-2025-53893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53893" }, { "cve": "CVE-2025-53945", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53945" } ], "notes": [ { "category": "general", "text": "apko allows users to build and publish OCI container images built from apk packages. Starting in version 0.27.0 and prior to version 0.29.5, critical files were inadvertently set to 0666, which could likely be abused for root escalation. Version 0.29.5 contains a fix for the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53945", "url": "https://www.suse.com/security/cve/CVE-2025-53945" }, { "category": "external", "summary": "SUSE Bug 1246746 for CVE-2025-53945", "url": "https://bugzilla.suse.com/1246746" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53945" }, { "cve": "CVE-2025-54059", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-54059" } ], "notes": [ { "category": "general", "text": "melange allows users to build apk packages using declarative pipelines. Starting in version 0.23.0 and prior to version 0.29.5, SBOM files generated by melange in apks had file system permissions mode 666. This potentially allows an unprivileged user to tamper with apk SBOMs on a running image, potentially confusing security scanners. An attacker could also perform a DoS under special circumstances. Version 0.29.5 fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-54059", "url": "https://www.suse.com/security/cve/CVE-2025-54059" }, { "category": "external", "summary": "SUSE Bug 1246745 for CVE-2025-54059", "url": "https://bugzilla.suse.com/1246745" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-54059" }, { "cve": "CVE-2025-54379", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-54379" } ], "notes": [ { "category": "general", "text": "LF Edge eKuiper is a lightweight IoT data analytics and stream processing engine running on resource-constraint edge devices. In versions before 2.2.1, there is a critical SQL Injection vulnerability in the getLast API functionality of the eKuiper project. This flaw allows unauthenticated remote attackers to execute arbitrary SQL statements on the underlying SQLite database by manipulating the table name input in an API request. Exploitation can lead to data theft, corruption, or deletion, and full database compromise. This is fixed in version 2.2.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-54379", "url": "https://www.suse.com/security/cve/CVE-2025-54379" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "not set" } ], "title": "CVE-2025-54379" }, { "cve": "CVE-2025-5689", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-5689" } ], "notes": [ { "category": "general", "text": "A flaw was found in the temporary user record that authd uses in the pre-auth NSS. As a result, a user login for the first time will be considered to be part of the root group in the context of that SSH session.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-5689", "url": "https://www.suse.com/security/cve/CVE-2025-5689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-5689" }, { "cve": "CVE-2025-5981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-5981" } ], "notes": [ { "category": "general", "text": "Arbitrary file write as the OSV-SCALIBR user on the host system via a path traversal vulnerability when using OSV-SCALIBR\u0027s unpack() function for container images. Particularly, when using the CLI flag --remote-image on untrusted container images.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-5981", "url": "https://www.suse.com/security/cve/CVE-2025-5981" }, { "category": "external", "summary": "SUSE Bug 1244726 for CVE-2025-5981", "url": "https://bugzilla.suse.com/1244726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-5981" }, { "cve": "CVE-2025-6023", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6023" } ], "notes": [ { "category": "general", "text": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6023", "url": "https://www.suse.com/security/cve/CVE-2025-6023" }, { "category": "external", "summary": "SUSE Bug 1246735 for CVE-2025-6023", "url": "https://bugzilla.suse.com/1246735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6023" }, { "cve": "CVE-2025-6032", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6032" } ], "notes": [ { "category": "general", "text": "A flaw was found in Podman. The podman machine init command fails to verify the TLS certificate when downloading the VM images from an OCI registry. This issue results in a Man In The Middle attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6032", "url": "https://www.suse.com/security/cve/CVE-2025-6032" }, { "category": "external", "summary": "SUSE Bug 1245320 for CVE-2025-6032", "url": "https://bugzilla.suse.com/1245320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6032" }, { "cve": "CVE-2025-6224", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6224" } ], "notes": [ { "category": "general", "text": "Certificate generation in juju/utils using the cert.NewLeaf function could include private information. If this certificate were then transferred over the network in plaintext, an attacker listening on that network could sniff the certificate and trivially extract the private key from it.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6224", "url": "https://www.suse.com/security/cve/CVE-2025-6224" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-6224" }, { "cve": "CVE-2025-6226", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6226" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.6, 10.8.x \u003c= 10.8.1, 10.7.x \u003c= 10.7.3, 9.11.x \u003c= 9.11.16 fail to verify authorization when retrieving cached posts by PendingPostID which allows an authenticated user to read posts in private channels they don\u0027t have access to via guessing the PendingPostID of recently created posts.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6226", "url": "https://www.suse.com/security/cve/CVE-2025-6226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-6226" }, { "cve": "CVE-2025-6227", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6227" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.7, 9.11.x \u003c= 9.11.16 fail to negotiate a new token when accepting the invite which allows a user that intercepts both invite and password to send synchronization payloads to the server that originally created the invite via the REST API.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6227", "url": "https://www.suse.com/security/cve/CVE-2025-6227" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "low" } ], "title": "CVE-2025-6227" }, { "cve": "CVE-2025-6233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6233" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.8.x \u003c= 10.8.1, 10.7.x \u003c= 10.7.3, 10.5.x \u003c= 10.5.7, 9.11.x \u003c= 9.11.16 fail to sanitize input paths of file attachments in the bulk import JSONL file, which allows a system admin to read arbitrary system files via path traversal.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6233", "url": "https://www.suse.com/security/cve/CVE-2025-6233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-6233" }, { "cve": "CVE-2025-6264", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6264" } ], "notes": [ { "category": "general", "text": "Velociraptor allows collection of VQL queries packaged into Artifacts from endpoints. These artifacts can be used to do anything and usually run with elevated permissions. To limit access to some dangerous artifact, Velociraptor allows for those to require high permissions like EXECVE to launch.\n\nThe Admin.Client.UpdateClientConfig is an artifact used to update the client\u0027s configuration. This artifact did not enforce an additional required permission, allowing users with COLLECT_CLIENT permissions (normally given by the \"Investigator\" role) to collect it from endpoints and update the configuration. \n\nThis can lead to arbitrary command execution and endpoint takeover.\n\nTo successfully exploit this vulnerability the user must already have access to collect artifacts from the endpoint (i.e. have the COLLECT_CLIENT given typically by the \"Investigator\u0027 role).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6264", "url": "https://www.suse.com/security/cve/CVE-2025-6264" }, { "category": "external", "summary": "SUSE Bug 1245123 for CVE-2025-6264", "url": "https://bugzilla.suse.com/1245123" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-6264" }, { "cve": "CVE-2025-6624", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6624" } ], "notes": [ { "category": "general", "text": "Versions of the package snyk before 1.1297.3 are vulnerable to Insertion of Sensitive Information into Log File through local Snyk CLI debug logs. Container Registry credentials provided via environment variables or command line arguments can be exposed when executing Snyk CLI in DEBUG or DEBUG/TRACE mode.\r\rThe issue affects the following Snyk commands:\r\r1. When snyk container test or snyk container monitor commands are run against a container registry, with debug mode enabled, the container registry credentials may be written into the local Snyk CLI debug log. This only happens with credentials specified in environment variables (SNYK_REGISTRY_USERNAME and SNYK_REGISTRY_PASSWORD), or in the CLI (--password/-p and --username/-u).\r\r2. When snyk auth command is executed with debug mode enabled AND the log level is set to TRACE, the Snyk access / refresh credential tokens used to connect the CLI to Snyk may be written into the local CLI debug logs.\r\r3. When snyk iac test is executed with a Remote IAC Custom rules bundle, debug mode enabled, AND the log level is set to TRACE, the docker registry token may be written into the local CLI debug logs.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6624", "url": "https://www.suse.com/security/cve/CVE-2025-6624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6624" } ] }
fkie_cve-2025-0928
Vulnerability from fkie_nvd
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution." }, { "lang": "es", "value": "En versiones de Juju anteriores a la 3.6.8 y la 2.9.52, cualquier usuario autenticado del controlador pod\u00eda cargar binarios arbitrarios del agente en cualquier modelo o en el propio controlador, sin verificar la pertenencia al modelo ni requerir permisos expl\u00edcitos. Esto permit\u00eda la distribuci\u00f3n de binarios envenenados a equipos nuevos o actualizados, lo que pod\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo." } ], "id": "CVE-2025-0928", "lastModified": "2025-07-10T13:18:53.830", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security@ubuntu.com", "type": "Secondary" } ] }, "published": "2025-07-08T18:15:26.767", "references": [ { "source": "security@ubuntu.com", "url": "https://github.com/juju/juju/security/advisories/GHSA-4vc8-wvhw-m5gv" } ], "sourceIdentifier": "security@ubuntu.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-285" } ], "source": "security@ubuntu.com", "type": "Secondary" } ] }
ghsa-4vc8-wvhw-m5gv
Vulnerability from github
Summary
You can affect the agent binaries used in a Juju controller and the code that is run in the binaries by simply having a user account on a controller. You aren't required to have a model or any permissions. This just requires a user account in the controller database.
Details
Because of the way Juju upload tools code works in the controller it only checks that the user uploading agent binaries is authenticated and is a user tag. No more checks are performed and it allows that user to upload binaries to any model they like (as long as they know the model uuid) or upload binaries to the controller (attacker doesn't need to know any uuid's for controller or controller model).
Once the poison binaries have been uploaded any new machine that is started in the affected model or controller will get started with the poison binaries. Alternatively administrator's of the controller running either juju upgrade-controller
or juju upgrade-model
will force distribution of the poisoned binaries to all machines in either the model or poison the controllers themselves.
On top of this the exploit can be done with the Juju client tooling itself and no real knowledge on constructing raw API requests is required.
The tools handler is the main piece of code that is used in the APIServer for handling upload requests and persisting the data uploaded: The following code references is how Juju uses and defines this: - The tools upload handler is defined here (https://github.com/juju/juju/blob/3.6/apiserver/apiserver.go#L972) - The tools upload handler is created in the api server here (https://github.com/juju/juju/blob/4bcbd094097016b2fde926afd8c9e590eabb3f0c/apiserver/apiserver.go#L766C2-L766C25). - The main authoriser that is used for the upload handler is created here (https://github.com/juju/juju/blob/4bcbd094097016b2fde926afd8c9e590eabb3f0c/apiserver/apiserver.go#L770C2-L770C28) - The upload handler is registered for the model here (https://github.com/juju/juju/blob/4bcbd094097016b2fde926afd8c9e590eabb3f0c/apiserver/apiserver.go#L902) - The upload handler is registered for the controller here (https://github.com/juju/juju/blob/4bcbd094097016b2fde926afd8c9e590eabb3f0c/apiserver/apiserver.go#L972)
The authoriser that is used (https://github.com/juju/juju/blame/4bcbd094097016b2fde926afd8c9e590eabb3f0c/apiserver/httpcontext.go#L209) only confirms that the logged in user is authenticated and authenticated as a user tag. No other checks are performed.
The toolsUploaderHandler
also uses another server func for getting the Mongo state. This also confirms a logged in user but the state that is returned to the caller is scoped to whatever model the requester has asked for. No checks are performed to make sure that the user in question actually has access to this model or the controller. See code here (https://github.com/juju/juju/blob/4e50a28cdde17832aa31634915fbe7442dca6ab3/apiserver/httpcontext.go#L38). We end up here through a few layers of indirection of https://github.com/juju/juju/blob/4bcbd094097016b2fde926afd8c9e590eabb3f0c/apiserver/apiserver.go#L768
We can also see that when handlers are registered with no model uuid scope in the handler like the controller registration of the tools upload handler, the model uuid gets defaulted to that of the controller model. See (https://github.com/juju/juju/blob/4bcbd094097016b2fde926afd8c9e590eabb3f0c/apiserver/apiserver.go#L690).
PoC
This proof of concept was done with the latest tip of the juju/juju
3.6 branch (https://github.com/juju/juju/commit/cd12b4951d657a980e113564bf2ea82f167589fd). Pull this code and work from inside of the root of the code base. It is expected that this security issue applies to 2.9 onwards as well.
Repo steps:
-
Bootstrap a new controller to lxd. This was done with a compiled client from the branch but there is no reason performing this action from latest snap won't produce the same result.
juju bootstrap localhost sec-demo
-
Add a new user to the controller. This is the user with no permissions or models that we will prove the problem with.
juju add-user poisoner poisoner
-
From step 2 save the registration string that the
juju
client prints out. -
We are going to remove the local
juju
admin credentials and information that was made during bootstrap. We will use this later on for confirming the attack.mv ~/.local/share/juju /tmp/juju-bak
-
Run the
juju
cli registration command for the new user that was saved from step 3. Set the new password to whatever you wish and then re-enter to login into the controller. After this step we are now logged in as an unprivileged user to the controller. -
Apply the following patch to the currently checked out
juju
code base: ``` cat <<EOF | git apply - diff --git a/cmd/jujud/main.go b/cmd/jujud/main.go index f268509a52..1b01a74b66 100644 --- a/cmd/jujud/main.go +++ b/cmd/jujud/main.go @@ -315,6 +315,16 @@ func Main(args []string) int { os.Exit(exit_err) } -
logger.Criticalf("----------------------")
- logger.Criticalf("----------------------")
- logger.Criticalf("----------------------")
- logger.Criticalf("----------------------")
- logger.Criticalf("Got access to the binary")
- logger.Criticalf("----------------------")
- logger.Criticalf("----------------------")
- logger.Criticalf("----------------------")
- logger.Criticalf("----------------------") + var code int commandName := filepath.Base(args[0]) switch commandName { diff --git a/version/version.go b/version/version.go index 2bbc8968c8..40af52f337 100644 --- a/version/version.go +++ b/version/version.go @@ -18,7 +18,7 @@ import ( // The presence and format of this constant is very important. // The debian/rules build recipe uses this value for the version // number of the release package. -const version = "3.6.6" +const version = "3.6.7"
// UserAgentVersion defines a user agent version used for communication for // outside resources. EOF ```
-
Set bogus model information. To make the
sync-agent-binary
command work below we need to set a bogus model that is in use by the client. This is done through the localmodels.yaml
file. Theuuid
featured here does not matter at and can be set to anything that parses as a uuid injuju
. This is just to trick the client tooling, the attacker could just manually construct the http request their self to bypass this.cat <<EOF > ~/.local/share/juju/models.yaml controllers: sec-demo: models: admin/controller: uuid: 4dde46dd-a514-491e-8a5f-b908b5310c02 type: iaas branch: "" current-model: admin/controller EOF
-
Next build the changes with
make simplestreams
. - The output of step 9 will provide an export command to run. Please execute this command to point the
juju
client at your local simple streams cache. - Next sync the compiled agent binaries from step 9 to the controller with
juju sync-agent-binary --debug --agent-version 3.6.7
.
At this stage the controllers agent binary cache has been poisoned and the security issue has been proven.
- We can now swap back to the administrator user to start forcing binary circulation.
mv ~/.local/share/juju /tmp/juju-poison
and thenmv /tmp/juju-bak ~/.local/share/juju
At this stage the issue can be demonstrated with just a simple juju upgrade-controller
and a controller upgrade will kick off. You can also upgrade a model. When I was testing this my upgrade-controller
failed to shut down the controller for reasons unrelated to this security issue. I was able to log into the controller and confirm with sha256sum that the controller had downloaded the new binaries and the checksums matched. They were also symlink as the new binaries to run for machine-0
. This was under /var/lib/juju/tools
on the controller machine.
It would also be possible to affect new machines coming up in a model by repeating the steps above but changing the version to that of the model that you want to be poisoned.
Impact
This is a bad vulnerability in my opinion. It allows a user with no permissions to eventually consume an entire juju
controller with poisoned binaries and gain access to all of the infrastructure and secrets on that controller. Through model migration it would also be possible to poison other controllers that the user doesn't have access to.
This also requires that an administrator upgrade or migrate aspects of the controller. But a bad actor could affect brand new machines coming up in the system straight away.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/juju/juju" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20250619215741-4034aa13c7cf" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-0928" ], "database_specific": { "cwe_ids": [ "CWE-285" ], "github_reviewed": true, "github_reviewed_at": "2025-07-09T15:33:56Z", "nvd_published_at": "2025-07-08T18:15:26Z", "severity": "HIGH" }, "details": "### Summary\nYou can affect the agent binaries used in a Juju controller and the code that is run in the binaries by simply having a user account on a controller. You aren\u0027t required to have a model or any permissions. This just requires a user account in the controller database.\n\n### Details\nBecause of the way Juju upload tools code works in the controller it only checks that the user uploading agent binaries is authenticated and is a user tag. No more checks are performed and it allows that user to upload binaries to any model they like (as long as they know the model uuid) or upload binaries to the controller (attacker doesn\u0027t need to know any uuid\u0027s for controller or controller model).\n\nOnce the poison binaries have been uploaded any new machine that is started in the affected model or controller will get started with the poison binaries. Alternatively administrator\u0027s of the controller running either `juju upgrade-controller` or `juju upgrade-model` will force distribution of the poisoned binaries to all machines in either the model or poison the controllers themselves.\n\nOn top of this the exploit can be done with the Juju client tooling itself and no real knowledge on constructing raw API requests is required.\n\nThe tools handler is the main piece of code that is used in the APIServer for handling upload requests and persisting the data uploaded: The following code references is how Juju uses and defines this:\n- The tools upload handler is defined here (https://github.com/juju/juju/blob/3.6/apiserver/apiserver.go#L972)\n- The tools upload handler is created in the api server here (https://github.com/juju/juju/blob/4bcbd094097016b2fde926afd8c9e590eabb3f0c/apiserver/apiserver.go#L766C2-L766C25).\n- The main authoriser that is used for the upload handler is created here (https://github.com/juju/juju/blob/4bcbd094097016b2fde926afd8c9e590eabb3f0c/apiserver/apiserver.go#L770C2-L770C28)\n- The upload handler is registered for the model here (https://github.com/juju/juju/blob/4bcbd094097016b2fde926afd8c9e590eabb3f0c/apiserver/apiserver.go#L902)\n- The upload handler is registered for the controller here (https://github.com/juju/juju/blob/4bcbd094097016b2fde926afd8c9e590eabb3f0c/apiserver/apiserver.go#L972)\n\nThe authoriser that is used (https://github.com/juju/juju/blame/4bcbd094097016b2fde926afd8c9e590eabb3f0c/apiserver/httpcontext.go#L209) only confirms that the logged in user is authenticated and authenticated as a user tag. No other checks are performed.\n\nThe `toolsUploaderHandler` also uses another server func for getting the Mongo state. This also confirms a logged in user but the state that is returned to the caller is scoped to whatever model the requester has asked for. No checks are performed to make sure that the user in question actually has access to this model or the controller. See code here (https://github.com/juju/juju/blob/4e50a28cdde17832aa31634915fbe7442dca6ab3/apiserver/httpcontext.go#L38). We end up here through a few layers of indirection of https://github.com/juju/juju/blob/4bcbd094097016b2fde926afd8c9e590eabb3f0c/apiserver/apiserver.go#L768\n\nWe can also see that when handlers are registered with no model uuid scope in the handler like the controller registration of the tools upload handler, the model uuid gets defaulted to that of the controller model. See (https://github.com/juju/juju/blob/4bcbd094097016b2fde926afd8c9e590eabb3f0c/apiserver/apiserver.go#L690).\n\n### PoC\nThis proof of concept was done with the latest tip of the `juju/juju` 3.6 branch (https://github.com/juju/juju/commit/cd12b4951d657a980e113564bf2ea82f167589fd). Pull this code and work from inside of the root of the code base. It is expected that this security issue applies to 2.9 onwards as well.\n\nRepo steps:\n\n1. Bootstrap a new controller to lxd. This was done with a compiled client from the branch but there is no reason performing this action from latest snap won\u0027t produce the same result.\n` juju bootstrap localhost sec-demo`\n\n2. Add a new user to the controller. This is the user with no permissions or models that we will prove the problem with.\n`juju add-user poisoner poisoner`\n\n3. From step 2 save the registration string that the `juju` client prints out.\n\n4. We are going to remove the local `juju` admin credentials and information that was made during bootstrap. We will use this later on for confirming the attack.\n`mv ~/.local/share/juju /tmp/juju-bak`\n\n5. Run the `juju` cli registration command for the new user that was saved from step 3. Set the new password to whatever you wish and then re-enter to login into the controller. After this step we are now logged in as an unprivileged user to the controller.\n\n6. Apply the following patch to the currently checked out `juju` code base:\n```\ncat \u003c\u003cEOF | git apply -\ndiff --git a/cmd/jujud/main.go b/cmd/jujud/main.go\nindex f268509a52..1b01a74b66 100644\n--- a/cmd/jujud/main.go\n+++ b/cmd/jujud/main.go\n@@ -315,6 +315,16 @@ func Main(args []string) int {\n \t\tos.Exit(exit_err)\n \t}\n\n+\tlogger.Criticalf(\"----------------------\")\n+\tlogger.Criticalf(\"----------------------\")\n+\tlogger.Criticalf(\"----------------------\")\n+\tlogger.Criticalf(\"----------------------\")\n+\tlogger.Criticalf(\"Got access to the binary\")\n+\tlogger.Criticalf(\"----------------------\")\n+\tlogger.Criticalf(\"----------------------\")\n+\tlogger.Criticalf(\"----------------------\")\n+\tlogger.Criticalf(\"----------------------\")\n+\n \tvar code int\n \tcommandName := filepath.Base(args[0])\n \tswitch commandName {\ndiff --git a/version/version.go b/version/version.go\nindex 2bbc8968c8..40af52f337 100644\n--- a/version/version.go\n+++ b/version/version.go\n@@ -18,7 +18,7 @@ import (\n // The presence and format of this constant is very important.\n // The debian/rules build recipe uses this value for the version\n // number of the release package.\n-const version = \"3.6.6\"\n+const version = \"3.6.7\"\n\n // UserAgentVersion defines a user agent version used for communication for\n // outside resources.\nEOF\n```\n\n7. Set bogus model information. To make the `sync-agent-binary` command work below we need to set a bogus model that is in use by the client. This is done through the local `models.yaml` file. The `uuid` featured here does not matter at and can be set to anything that parses as a uuid in `juju`. This is just to trick the client tooling, the attacker could just manually construct the http request their self to bypass this.\n```\ncat \u003c\u003cEOF \u003e ~/.local/share/juju/models.yaml\ncontrollers:\n sec-demo:\n models:\n admin/controller:\n uuid: 4dde46dd-a514-491e-8a5f-b908b5310c02\n type: iaas\n branch: \"\"\n current-model: admin/controller\nEOF\n```\n\n8. Next build the changes with `make simplestreams`.\n9. The output of step 9 will provide an export command to run. Please execute this command to point the `juju` client at your local simple streams cache.\n10. Next sync the compiled agent binaries from step 9 to the controller with `juju sync-agent-binary --debug --agent-version 3.6.7`.\n\n**At this stage the controllers agent binary cache has been poisoned and the security issue has been proven.**\n\n11. We can now swap back to the administrator user to start forcing binary circulation. `mv ~/.local/share/juju /tmp/juju-poison` and then `mv /tmp/juju-bak ~/.local/share/juju`\n\nAt this stage the issue can be demonstrated with just a simple `juju upgrade-controller` and a controller upgrade will kick off. You can also upgrade a model. When I was testing this my `upgrade-controller` failed to shut down the controller for reasons unrelated to this security issue. I was able to log into the controller and confirm with sha256sum that the controller had downloaded the new binaries and the checksums matched. They were also symlink as the new binaries to run for `machine-0`. This was under `/var/lib/juju/tools` on the controller machine.\n\nIt would also be possible to affect new machines coming up in a model by repeating the steps above but changing the version to that of the model that you want to be poisoned.\n\n### Impact\nThis is a bad vulnerability in my opinion. It allows a user with no permissions to eventually consume an entire `juju` controller with poisoned binaries and gain access to all of the infrastructure and secrets on that controller. Through model migration it would also be possible to poison other controllers that the user doesn\u0027t have access to.\n\nThis also requires that an administrator upgrade or migrate aspects of the controller. But a bad actor could affect brand new machines coming up in the system straight away.", "id": "GHSA-4vc8-wvhw-m5gv", "modified": "2025-07-09T15:33:57Z", "published": "2025-07-09T15:33:56Z", "references": [ { "type": "WEB", "url": "https://github.com/juju/juju/security/advisories/GHSA-4vc8-wvhw-m5gv" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0928" }, { "type": "WEB", "url": "https://github.com/juju/juju/commit/22cdcf6b54c2f371822e1c203d4f341be6c9589e" }, { "type": "WEB", "url": "https://github.com/juju/juju/commit/311e374cb8d2431032c51fb3fb5c4b0aaaa7196c" }, { "type": "WEB", "url": "https://github.com/juju/juju/commit/4034aa13c7cf5a37427fcd032925d5d21955b096" }, { "type": "WEB", "url": "https://github.com/juju/juju/commit/b4176e6e45c2c3c817ab60b39e2d52f9a11a5ddf" }, { "type": "PACKAGE", "url": "https://github.com/juju/juju" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "Juju allows arbitrary executable uploads via authenticated endpoint without authorization" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.