Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-52894 (GCVE-0-2025-52894)
Vulnerability from cvelistv5
- CWE-20 - Improper Input Validation
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-52894", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-25T20:23:37.656322Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-25T20:24:28.109Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "openbao", "vendor": "openbao", "versions": [ { "status": "affected", "version": "\u003c 2.3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 allowed an attacker to perform unauthenticated, unaudited cancellation of root rekey and recovery rekey operations, effecting a denial of service. In OpenBao v2.2.0 and later, manually setting the configuration option `disable_unauthed_rekey_endpoints=true` allows an operator to deny these rarely-used endpoints on global listeners. A patch is available at commit fe75468822a22a88318c6079425357a02ae5b77b. In a future OpenBao release communicated on OpenBao\u0027s website, the maintainers will set this to `true` for all users and provide an authenticated alternative. As a workaround, if an active proxy or load balancer sits in front of OpenBao, an operator can deny requests to these endpoints from unauthorized IP ranges." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 6.9, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-25T17:00:31.313Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/openbao/openbao/security/advisories/GHSA-prpj-rchp-9j5h", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openbao/openbao/security/advisories/GHSA-prpj-rchp-9j5h" }, { "name": "https://github.com/openbao/openbao/commit/fe75468822a22a88318c6079425357a02ae5b77b", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openbao/openbao/commit/fe75468822a22a88318c6079425357a02ae5b77b" }, { "name": "https://openbao.org/docs/deprecation", "tags": [ "x_refsource_MISC" ], "url": "https://openbao.org/docs/deprecation" }, { "name": "https://openbao.org/docs/deprecation/unauthed-rekey", "tags": [ "x_refsource_MISC" ], "url": "https://openbao.org/docs/deprecation/unauthed-rekey" } ], "source": { "advisory": "GHSA-prpj-rchp-9j5h", "discovery": "UNKNOWN" }, "title": "OpenBao Vulnerable to Unauthenticated Rekey Operation Cancellation" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-52894", "datePublished": "2025-06-25T16:59:02.058Z", "dateReserved": "2025-06-20T17:42:25.709Z", "dateUpdated": "2025-06-25T20:24:28.109Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-52894\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-06-25T17:15:39.677\",\"lastModified\":\"2025-08-12T20:51:16.360\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 allowed an attacker to perform unauthenticated, unaudited cancellation of root rekey and recovery rekey operations, effecting a denial of service. In OpenBao v2.2.0 and later, manually setting the configuration option `disable_unauthed_rekey_endpoints=true` allows an operator to deny these rarely-used endpoints on global listeners. A patch is available at commit fe75468822a22a88318c6079425357a02ae5b77b. In a future OpenBao release communicated on OpenBao\u0027s website, the maintainers will set this to `true` for all users and provide an authenticated alternative. As a workaround, if an active proxy or load balancer sits in front of OpenBao, an operator can deny requests to these endpoints from unauthorized IP ranges.\"},{\"lang\":\"es\",\"value\":\"OpenBao existe para proporcionar una soluci\u00f3n de software que permite gestionar, almacenar y distribuir datos confidenciales, como secretos, certificados y claves. En versiones anteriores a la v2.3.0, OpenBao permit\u00eda a un atacante realizar cancelaciones no autenticadas ni auditadas de operaciones de regeneraci\u00f3n de claves de ra\u00edz y de recuperaci\u00f3n, lo que provocaba una denegaci\u00f3n de servicio. En OpenBao v2.2.0 y posteriores, la configuraci\u00f3n manual de la opci\u00f3n `disable_unauthed_rekey_endpoints=true` permite a un operador denegar el acceso a estos endpoints poco utilizados en escuchas globales. Hay un parche disponible en el commit fe75468822a22a88318c6079425357a02ae5b77b. En una futura versi\u00f3n de OpenBao, anunciada en su sitio web, los fabricantees la configurar\u00e1n como `true` para todos los usuarios y ofrecer\u00e1n una alternativa autenticada. Como soluci\u00f3n alternativa, si un proxy activo o un balanceador de carga se encuentra frente a OpenBao, un operador puede rechazar solicitudes a estos endpoints desde rangos de IP no autorizados.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":6.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"LOW\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.2.0\",\"versionEndExcluding\":\"2.3.0\",\"matchCriteriaId\":\"C70EF0AA-975A-4F83-9344-CBEA54F8601B\"}]}]}],\"references\":[{\"url\":\"https://github.com/openbao/openbao/commit/fe75468822a22a88318c6079425357a02ae5b77b\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/openbao/openbao/security/advisories/GHSA-prpj-rchp-9j5h\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://openbao.org/docs/deprecation\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Product\"]},{\"url\":\"https://openbao.org/docs/deprecation/unauthed-rekey\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Product\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-52894\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-25T20:23:37.656322Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-25T20:24:23.027Z\"}}], \"cna\": {\"title\": \"OpenBao Vulnerable to Unauthenticated Rekey Operation Cancellation\", \"source\": {\"advisory\": \"GHSA-prpj-rchp-9j5h\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 6.9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"LOW\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"openbao\", \"product\": \"openbao\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 2.3.0\"}]}], \"references\": [{\"url\": \"https://github.com/openbao/openbao/security/advisories/GHSA-prpj-rchp-9j5h\", \"name\": \"https://github.com/openbao/openbao/security/advisories/GHSA-prpj-rchp-9j5h\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/openbao/openbao/commit/fe75468822a22a88318c6079425357a02ae5b77b\", \"name\": \"https://github.com/openbao/openbao/commit/fe75468822a22a88318c6079425357a02ae5b77b\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://openbao.org/docs/deprecation\", \"name\": \"https://openbao.org/docs/deprecation\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://openbao.org/docs/deprecation/unauthed-rekey\", \"name\": \"https://openbao.org/docs/deprecation/unauthed-rekey\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 allowed an attacker to perform unauthenticated, unaudited cancellation of root rekey and recovery rekey operations, effecting a denial of service. In OpenBao v2.2.0 and later, manually setting the configuration option `disable_unauthed_rekey_endpoints=true` allows an operator to deny these rarely-used endpoints on global listeners. A patch is available at commit fe75468822a22a88318c6079425357a02ae5b77b. In a future OpenBao release communicated on OpenBao\u0027s website, the maintainers will set this to `true` for all users and provide an authenticated alternative. As a workaround, if an active proxy or load balancer sits in front of OpenBao, an operator can deny requests to these endpoints from unauthorized IP ranges.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20: Improper Input Validation\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-06-25T17:00:31.313Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-52894\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-06-25T20:24:28.109Z\", \"dateReserved\": \"2025-06-20T17:42:25.709Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2025-06-25T16:59:02.058Z\", \"assignerShortName\": \"GitHub_M\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
opensuse-su-2025:15405-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "govulncheck-vulndb-0.0.20250730T213748-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the govulncheck-vulndb-0.0.20250730T213748-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15405", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15405-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2024-44905 page", "url": "https://www.suse.com/security/cve/CVE-2024-44905/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-44906 page", "url": "https://www.suse.com/security/cve/CVE-2024-44906/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56731 page", "url": "https://www.suse.com/security/cve/CVE-2024-56731/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-0928 page", "url": "https://www.suse.com/security/cve/CVE-2025-0928/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-1088 page", "url": "https://www.suse.com/security/cve/CVE-2025-1088/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-30086 page", "url": "https://www.suse.com/security/cve/CVE-2025-30086/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-32019 page", "url": "https://www.suse.com/security/cve/CVE-2025-32019/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-3227 page", "url": "https://www.suse.com/security/cve/CVE-2025-3227/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-3228 page", "url": "https://www.suse.com/security/cve/CVE-2025-3228/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-3415 page", "url": "https://www.suse.com/security/cve/CVE-2025-3415/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4563 page", "url": "https://www.suse.com/security/cve/CVE-2025-4563/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4656 page", "url": "https://www.suse.com/security/cve/CVE-2025-4656/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-46702 page", "url": "https://www.suse.com/security/cve/CVE-2025-46702/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4674 page", "url": "https://www.suse.com/security/cve/CVE-2025-4674/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47281 page", "url": "https://www.suse.com/security/cve/CVE-2025-47281/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47871 page", "url": "https://www.suse.com/security/cve/CVE-2025-47871/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47943 page", "url": "https://www.suse.com/security/cve/CVE-2025-47943/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4922 page", "url": "https://www.suse.com/security/cve/CVE-2025-4922/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4981 page", "url": "https://www.suse.com/security/cve/CVE-2025-4981/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-49825 page", "url": "https://www.suse.com/security/cve/CVE-2025-49825/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-5030 page", "url": "https://www.suse.com/security/cve/CVE-2025-5030/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-51471 page", "url": "https://www.suse.com/security/cve/CVE-2025-51471/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52477 page", "url": "https://www.suse.com/security/cve/CVE-2025-52477/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52889 page", "url": "https://www.suse.com/security/cve/CVE-2025-52889/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52890 page", "url": "https://www.suse.com/security/cve/CVE-2025-52890/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52893 page", "url": "https://www.suse.com/security/cve/CVE-2025-52893/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52894 page", "url": "https://www.suse.com/security/cve/CVE-2025-52894/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52900 page", "url": "https://www.suse.com/security/cve/CVE-2025-52900/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52901 page", "url": "https://www.suse.com/security/cve/CVE-2025-52901/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52902 page", "url": "https://www.suse.com/security/cve/CVE-2025-52902/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52903 page", "url": "https://www.suse.com/security/cve/CVE-2025-52903/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52904 page", "url": "https://www.suse.com/security/cve/CVE-2025-52904/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52995 page", "url": "https://www.suse.com/security/cve/CVE-2025-52995/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52996 page", "url": "https://www.suse.com/security/cve/CVE-2025-52996/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52997 page", "url": "https://www.suse.com/security/cve/CVE-2025-52997/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53512 page", "url": "https://www.suse.com/security/cve/CVE-2025-53512/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53513 page", "url": "https://www.suse.com/security/cve/CVE-2025-53513/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53547 page", "url": "https://www.suse.com/security/cve/CVE-2025-53547/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53632 page", "url": "https://www.suse.com/security/cve/CVE-2025-53632/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53633 page", "url": "https://www.suse.com/security/cve/CVE-2025-53633/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53634 page", "url": "https://www.suse.com/security/cve/CVE-2025-53634/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53826 page", "url": "https://www.suse.com/security/cve/CVE-2025-53826/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53893 page", "url": "https://www.suse.com/security/cve/CVE-2025-53893/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53945 page", "url": "https://www.suse.com/security/cve/CVE-2025-53945/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-54059 page", "url": "https://www.suse.com/security/cve/CVE-2025-54059/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-54379 page", "url": "https://www.suse.com/security/cve/CVE-2025-54379/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-5689 page", "url": "https://www.suse.com/security/cve/CVE-2025-5689/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-5981 page", "url": "https://www.suse.com/security/cve/CVE-2025-5981/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6023 page", "url": "https://www.suse.com/security/cve/CVE-2025-6023/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6032 page", "url": "https://www.suse.com/security/cve/CVE-2025-6032/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6224 page", "url": "https://www.suse.com/security/cve/CVE-2025-6224/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6226 page", "url": "https://www.suse.com/security/cve/CVE-2025-6226/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6227 page", "url": "https://www.suse.com/security/cve/CVE-2025-6227/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6233 page", "url": "https://www.suse.com/security/cve/CVE-2025-6233/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6264 page", "url": "https://www.suse.com/security/cve/CVE-2025-6264/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6624 page", "url": "https://www.suse.com/security/cve/CVE-2025-6624/" } ], "title": "govulncheck-vulndb-0.0.20250730T213748-1.1 on GA media", "tracking": { "current_release_date": "2025-08-04T00:00:00Z", "generator": { "date": "2025-08-04T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15405-1", "initial_release_date": "2025-08-04T00:00:00Z", "revision_history": [ { "date": "2025-08-04T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "product": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "product_id": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "product": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "product_id": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "product": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "product_id": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64", "product": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64", "product_id": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64" }, "product_reference": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le" }, "product_reference": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x" }, "product_reference": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" }, "product_reference": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-44905", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-44905" } ], "notes": [ { "category": "general", "text": "go-pg pg v10.13.0 was discovered to contain a SQL injection vulnerability via the component /types/append_value.go.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-44905", "url": "https://www.suse.com/security/cve/CVE-2024-44905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-44905" }, { "cve": "CVE-2024-44906", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-44906" } ], "notes": [ { "category": "general", "text": "uptrace pgdriver v1.2.1 was discovered to contain a SQL injection vulnerability via the appendArg function in /pgdriver/format.go. The maintainer has stated that the issue is fixed in v1.2.15.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-44906", "url": "https://www.suse.com/security/cve/CVE-2024-44906" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-44906" }, { "cve": "CVE-2024-56731", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56731" } ], "notes": [ { "category": "general", "text": "Gogs is an open source self-hosted Git service. Prior to version 0.13.3, it\u0027s still possible to delete files under the .git directory and achieve remote command execution due to an insufficient patch for CVE-2024-39931. Unprivileged user accounts can execute arbitrary commands on the Gogs instance with the privileges of the account specified by RUN_USER in the configuration. Allowing attackers to access and alter any users\u0027 code hosted on the same instance. This issue has been patched in version 0.13.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56731", "url": "https://www.suse.com/security/cve/CVE-2024-56731" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "critical" } ], "title": "CVE-2024-56731" }, { "cve": "CVE-2025-0928", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-0928" } ], "notes": [ { "category": "general", "text": "In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-0928", "url": "https://www.suse.com/security/cve/CVE-2025-0928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-0928" }, { "cve": "CVE-2025-1088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-1088" } ], "notes": [ { "category": "general", "text": "In Grafana, an excessively long dashboard title or panel name will cause Chromium browsers to become unresponsive due to Improper Input Validation vulnerability in Grafana.\nThis issue affects Grafana: before 11.6.2 and is fixed in 11.6.2 and higher.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-1088", "url": "https://www.suse.com/security/cve/CVE-2025-1088" }, { "category": "external", "summary": "SUSE Bug 1245224 for CVE-2025-1088", "url": "https://bugzilla.suse.com/1245224" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-1088" }, { "cve": "CVE-2025-30086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-30086" } ], "notes": [ { "category": "general", "text": "CNCF Harbor 2.13.x before 2.13.1 and 2.12.x before 2.12.4 allows information disclosure by administrators who can exploit an ORM Leak present in the /api/v2.0/users endpoint to leak users\u0027 password hash and salt values. The q URL parameter allows a user to filter users by any column, and filter password=~ could be abused to leak out a user\u0027s password hash character by character. An attacker with administrator access could exploit this to leak highly sensitive information stored in the Harbor database. All endpoints that support the q URL parameter are vulnerable to this ORM leak attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-30086", "url": "https://www.suse.com/security/cve/CVE-2025-30086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-30086" }, { "cve": "CVE-2025-32019", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-32019" } ], "notes": [ { "category": "general", "text": "Harbor is an open source trusted cloud native registry project that stores, signs, and scans content. Versions 2.11.2 and below, as well as versions 2.12.0-rc1 and 2.13.0-rc1, contain a vulnerability where the markdown field in the info tab page can be exploited to inject XSS code. This is fixed in versions 2.11.3 and 2.12.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-32019", "url": "https://www.suse.com/security/cve/CVE-2025-32019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-32019" }, { "cve": "CVE-2025-3227", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-3227" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to properly enforce channel member management permissions in playbook runs, allowing authenticated users without the \u0027Manage Channel Members\u0027 permission to add or remove users from public and private channels by manipulating playbook run participants when the run is linked to a channel.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-3227", "url": "https://www.suse.com/security/cve/CVE-2025-3227" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-3227" }, { "cve": "CVE-2025-3228", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-3228" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to properly retrieve requestorInfo from playbooks handler for guest users which allows an attacker access to the playbook run.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-3228", "url": "https://www.suse.com/security/cve/CVE-2025-3228" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-3228" }, { "cve": "CVE-2025-3415", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-3415" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. \nFixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-3415", "url": "https://www.suse.com/security/cve/CVE-2025-3415" }, { "category": "external", "summary": "SUSE Bug 1245302 for CVE-2025-3415", "url": "https://bugzilla.suse.com/1245302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-3415" }, { "cve": "CVE-2025-4563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4563" } ], "notes": [ { "category": "general", "text": "A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4563", "url": "https://www.suse.com/security/cve/CVE-2025-4563" }, { "category": "external", "summary": "SUSE Bug 1245185 for CVE-2025-4563", "url": "https://bugzilla.suse.com/1245185" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-4563" }, { "cve": "CVE-2025-4656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4656" } ], "notes": [ { "category": "general", "text": "Vault Community and Vault Enterprise rekey and recovery key operations can lead to a denial of service due to uncontrolled cancellation by a Vault operator. This vulnerability (CVE-2025-4656) has been remediated in Vault Community Edition 1.20.0 and Vault Enterprise 1.20.0, 1.19.6, 1.18.11, 1.17.17, and 1.16.22.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4656", "url": "https://www.suse.com/security/cve/CVE-2025-4656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "low" } ], "title": "CVE-2025-4656" }, { "cve": "CVE-2025-46702", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-46702" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to properly enforce channel member management permissions when adding participants to playbook runs. This allows authenticated users with member-level permissions to bypass system admin restrictions and add or remove users to/from private channels via the playbook run participants feature, even when the \u0027Manage Members\u0027 permission has been explicitly removed. This can lead to unauthorized access to sensitive channel content and allow guest users to gain channel management privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-46702", "url": "https://www.suse.com/security/cve/CVE-2025-46702" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-46702" }, { "cve": "CVE-2025-4674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4674" } ], "notes": [ { "category": "general", "text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4674", "url": "https://www.suse.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "SUSE Bug 1246118 for CVE-2025-4674", "url": "https://bugzilla.suse.com/1246118" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-4674" }, { "cve": "CVE-2025-47281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47281" } ], "notes": [ { "category": "general", "text": "Kyverno is a policy engine designed for cloud native platform engineering teams. In versions 1.14.1 and below, a Denial of Service (DoS) vulnerability exists due to improper handling of JMESPath variable substitutions. Attackers with permissions to create or update Kyverno policies can craft expressions using the {{@}} variable combined with a pipe and an invalid JMESPath function (e.g., {{@ | non_existent_function }}). This leads to a nil value being substituted into the policy structure. Subsequent processing by internal functions, specifically getValueAsStringMap, which expect string values, results in a panic due to a type assertion failure (interface {} is nil, not string). This crashes Kyverno worker threads in the admission controller and causes continuous crashes of the reports controller pod. This is fixed in version 1.14.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47281", "url": "https://www.suse.com/security/cve/CVE-2025-47281" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-47281" }, { "cve": "CVE-2025-47871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47871" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to properly validate channel membership when retrieving playbook run metadata, allowing authenticated users who are playbook members but not channel members to access sensitive information about linked private channels including channel name, display name, and participant count through the run metadata API endpoint.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47871", "url": "https://www.suse.com/security/cve/CVE-2025-47871" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-47871" }, { "cve": "CVE-2025-47943", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47943" } ], "notes": [ { "category": "general", "text": "Gogs is an open source self-hosted Git service. In application version 0.14.0+dev and prior, there is a stored cross-site scripting (XSS) vulnerability present in Gogs, which allows client-side Javascript code execution. The vulnerability is caused by the usage of a vulnerable and outdated component: pdfjs-1.4.20 under public/plugins/. This issue has been fixed for gogs.io/gogs in version 0.13.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47943", "url": "https://www.suse.com/security/cve/CVE-2025-47943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-47943" }, { "cve": "CVE-2025-4922", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4922" } ], "notes": [ { "category": "general", "text": "Nomad Community and Nomad Enterprise (\"Nomad\") prefix-based ACL policy lookup can lead to incorrect rule application and shadowing. This vulnerability, identified as CVE-2025-4922, is fixed in Nomad Community Edition 1.10.2 and Nomad Enterprise 1.10.2, 1.9.10, and 1.8.14.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4922", "url": "https://www.suse.com/security/cve/CVE-2025-4922" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-4922" }, { "cve": "CVE-2025-4981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4981" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to sanitize filenames in the archive extractor which allows authenticated users to write files to arbitrary locations on the filesystem via uploading archives with path traversal sequences in filenames, potentially leading to remote code execution. The vulnerability impacts instances where file uploads and document search by content is enabled (FileSettings.EnableFileAttachments = true and FileSettings.ExtractContent = true). These configuration settings are enabled by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4981", "url": "https://www.suse.com/security/cve/CVE-2025-4981" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "critical" } ], "title": "CVE-2025-4981" }, { "cve": "CVE-2025-49825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-49825" } ], "notes": [ { "category": "general", "text": "Teleport provides connectivity, authentication, access controls and audit for infrastructure. Community Edition versions before and including 17.5.1 are vulnerable to remote authentication bypass. At time of posting, there is no available open-source patch.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-49825", "url": "https://www.suse.com/security/cve/CVE-2025-49825" }, { "category": "external", "summary": "SUSE Bug 1244718 for CVE-2025-49825", "url": "https://bugzilla.suse.com/1244718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "critical" } ], "title": "CVE-2025-49825" }, { "cve": "CVE-2025-5030", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-5030" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Ackites KillWxapkg up to 2.4.1. It has been declared as critical. This vulnerability affects the function processFile of the file internal/unpack/unpack.go of the component wxapkg File Parser. The manipulation leads to os command injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-5030", "url": "https://www.suse.com/security/cve/CVE-2025-5030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-5030" }, { "cve": "CVE-2025-51471", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-51471" } ], "notes": [ { "category": "general", "text": "Cross-Domain Token Exposure in server.auth.getAuthorizationToken in Ollama 0.6.7 allows remote attackers to steal authentication tokens and bypass access controls via a malicious realm value in a WWW-Authenticate header returned by the /api/pull endpoint.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-51471", "url": "https://www.suse.com/security/cve/CVE-2025-51471" }, { "category": "external", "summary": "SUSE Bug 1246915 for CVE-2025-51471", "url": "https://bugzilla.suse.com/1246915" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-51471" }, { "cve": "CVE-2025-52477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52477" } ], "notes": [ { "category": "general", "text": "Octo-STS is a GitHub App that acts like a Security Token Service (STS) for the GitHub API. Octo-STS versions before v0.5.3 are vulnerable to unauthenticated SSRF by abusing fields in OpenID Connect tokens. Malicious tokens were shown to trigger internal network requests which could reflect error logs with sensitive information. Upgrade to v0.5.3 to resolve this issue. This version includes patch sets to sanitize input and redact logging.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52477", "url": "https://www.suse.com/security/cve/CVE-2025-52477" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52477" }, { "cve": "CVE-2025-52889", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52889" } ], "notes": [ { "category": "general", "text": "Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus version 6.12 and 6.13 generates nftables rules for local services (DHCP, DNS...) that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to DHCP pool exhaustion and opens the door for other attacks. A patch is available at commit 2516fb19ad8428454cb4edfe70c0a5f0dc1da214.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52889", "url": "https://www.suse.com/security/cve/CVE-2025-52889" }, { "category": "external", "summary": "SUSE Bug 1245365 for CVE-2025-52889", "url": "https://bugzilla.suse.com/1245365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52889" }, { "cve": "CVE-2025-52890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52890" } ], "notes": [ { "category": "general", "text": "Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus versions 6.12 and 6.13generates nftables rules that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to ARP spoofing on the bridge and to fully spoof another VM/container on the same bridge. Commit 254dfd2483ab8de39b47c2258b7f1cf0759231c8 contains a patch for the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52890", "url": "https://www.suse.com/security/cve/CVE-2025-52890" }, { "category": "external", "summary": "SUSE Bug 1245367 for CVE-2025-52890", "url": "https://bugzilla.suse.com/1245367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52890" }, { "cve": "CVE-2025-52893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52893" } ], "notes": [ { "category": "general", "text": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 may leak sensitive information in logs when processing malformed data. This is separate from the earlier HCSEC-2025-09 / CVE-2025-4166. This issue has been fixed in OpenBao v2.3.0 and later. Like with HCSEC-2025-09, there is no known workaround except to ensure properly formatted requests from all clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52893", "url": "https://www.suse.com/security/cve/CVE-2025-52893" }, { "category": "external", "summary": "SUSE Bug 1245381 for CVE-2025-52893", "url": "https://bugzilla.suse.com/1245381" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52893" }, { "cve": "CVE-2025-52894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52894" } ], "notes": [ { "category": "general", "text": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 allowed an attacker to perform unauthenticated, unaudited cancellation of root rekey and recovery rekey operations, effecting a denial of service. In OpenBao v2.2.0 and later, manually setting the configuration option `disable_unauthed_rekey_endpoints=true` allows an operator to deny these rarely-used endpoints on global listeners. A patch is available at commit fe75468822a22a88318c6079425357a02ae5b77b. In a future OpenBao release communicated on OpenBao\u0027s website, the maintainers will set this to `true` for all users and provide an authenticated alternative. As a workaround, if an active proxy or load balancer sits in front of OpenBao, an operator can deny requests to these endpoints from unauthorized IP ranges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52894", "url": "https://www.suse.com/security/cve/CVE-2025-52894" }, { "category": "external", "summary": "SUSE Bug 1245389 for CVE-2025-52894", "url": "https://bugzilla.suse.com/1245389" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52894" }, { "cve": "CVE-2025-52900", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52900" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. The file access permissions for files uploaded to or created from File Browser are never explicitly set by the application. The same is true for the database used by File Browser. On standard servers using File Browser prior to version 2.33.7 where the umask configuration has not been hardened before, this makes all the stated files readable by any operating system account. Version 2.33.7 fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52900", "url": "https://www.suse.com/security/cve/CVE-2025-52900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52900" }, { "cve": "CVE-2025-52901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52901" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.33.9, access tokens are used as GET parameters. The JSON Web Token (JWT) which is used as a session identifier will get leaked to anyone having access to the URLs accessed by the user. This will give an attacker full access to a user\u0027s account and, in consequence, to all sensitive files the user has access to. This issue has been patched in version 2.33.9.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52901", "url": "https://www.suse.com/security/cve/CVE-2025-52901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52901" }, { "cve": "CVE-2025-52902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52902" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. The Markdown preview function of File Browser prior to v2.33.7 is vulnerable to Stored Cross-Site-Scripting (XSS). Any JavaScript code that is part of a Markdown file uploaded by a user will be executed by the browser. Version 2.33.7 contains a fix for the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52902", "url": "https://www.suse.com/security/cve/CVE-2025-52902" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52902" }, { "cve": "CVE-2025-52903", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52903" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In version 2.32.0, the Command Execution feature of File Browser only allows the execution of shell command which have been predefined on a user-specific allowlist. Many tools allow the execution of arbitrary different commands, rendering this limitation void. The concrete impact depends on the commands being granted to the attacker, but the large number of standard commands allowing the execution of subcommands makes it likely that every user having the `Execute commands` permissions can exploit this vulnerability. Everyone who can exploit it will have full code execution rights with the uid of the server process. Until this issue is fixed, the maintainers recommend to completely disable `Execute commands` for all accounts. Since the command execution is an inherently dangerous feature that is not used by all deployments, it should be possible to completely disable it in the application\u0027s configuration. As a defense-in-depth measure, organizations not requiring command execution should operate the Filebrowser from a distroless container image. A patch version has been pushed to disable the feature for all existent installations, and making it opt-in. A warning has been added to the documentation and is printed on the console if the feature is enabled. Due to the project being in maintenance-only mode, the bug has not been fixed. The fix is tracked on pull request 5199.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52903", "url": "https://www.suse.com/security/cve/CVE-2025-52903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52903" }, { "cve": "CVE-2025-52904", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52904" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In version 2.32.0 of the web application, all users have a scope assigned, and they only have access to the files within that scope. The Command Execution feature of Filebrowser allows the execution of shell commands which are not restricted to the scope, potentially giving an attacker read and write access to all files managed by the server. Until this issue is fixed, the maintainers recommend to completely disable `Execute commands` for all accounts. Since the command execution is an inherently dangerous feature that is not used by all deployments, it should be possible to completely disable it in the application\u0027s configuration. As a defense-in-depth measure, organizations not requiring command execution should operate the Filebrowser from a distroless container image. A patch version has been pushed to disable the feature for all existent installations, and making it opt-in. A warning has been added to the documentation and is printed on the console if the feature is enabled. Due to the project being in maintenance-only mode, the bug has not been fixed. Fix is tracked on pull request 5199.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52904", "url": "https://www.suse.com/security/cve/CVE-2025-52904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52904" }, { "cve": "CVE-2025-52995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52995" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.33.10, the implementation of the allowlist is erroneous, allowing a user to execute more shell commands than they are authorized for. The concrete impact of this vulnerability depends on the commands configured, and the binaries installed on the server or in the container image. Due to the missing separation of scopes on the OS-level, this could give an attacker access to all files managed the application, including the File Browser database. This issue has been patched in version 2.33.10.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52995", "url": "https://www.suse.com/security/cve/CVE-2025-52995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52995" }, { "cve": "CVE-2025-52996", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52996" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In versions 2.32.0 and prior, the implementation of password protected links is error-prone, resulting in potential unprotected sharing of a file through a direct download link. This link can either be shared unknowingly by a user or discovered from various locations such as the browser history or the log of a proxy server used. At time of publication, no known patched versions are available.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52996", "url": "https://www.suse.com/security/cve/CVE-2025-52996" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52996" }, { "cve": "CVE-2025-52997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52997" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.34.1, a missing password policy and brute-force protection makes the authentication process insecure. Attackers could mount a brute-force attack to retrieve the passwords of all accounts in a given instance. This issue has been patched in version 2.34.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52997", "url": "https://www.suse.com/security/cve/CVE-2025-52997" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52997" }, { "cve": "CVE-2025-53512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53512" } ], "notes": [ { "category": "general", "text": "The /log endpoint on a Juju controller lacked sufficient authorization checks, allowing unauthorized users to access debug messages that could contain sensitive information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53512", "url": "https://www.suse.com/security/cve/CVE-2025-53512" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-53512" }, { "cve": "CVE-2025-53513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53513" } ], "notes": [ { "category": "general", "text": "The /charms endpoint on a Juju controller lacked sufficient authorization checks, allowing any user with an account on the controller to upload a charm. Uploading a malicious charm that exploits a Zip Slip vulnerability could allow an attacker to gain access to a machine running a unit through the affected charm.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53513", "url": "https://www.suse.com/security/cve/CVE-2025-53513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53513" }, { "cve": "CVE-2025-53547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53547" } ], "notes": [ { "category": "general", "text": "Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53547", "url": "https://www.suse.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "SUSE Bug 1246150 for CVE-2025-53547", "url": "https://bugzilla.suse.com/1246150" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53547" }, { "cve": "CVE-2025-53632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53632" } ], "notes": [ { "category": "general", "text": "Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. When decoding a scenario (i.e. a zip archive), the path of the file to write is not checked, potentially leading to zip slips. Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 47d188f and shipped in v0.1.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53632", "url": "https://www.suse.com/security/cve/CVE-2025-53632" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53632" }, { "cve": "CVE-2025-53633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53633" } ], "notes": [ { "category": "general", "text": "Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. When decoding a scenario (i.e. a zip archive), the size of the decoded content is not checked, potentially leading to zip bombs decompression. Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 14042aa and shipped in v0.1.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53633", "url": "https://www.suse.com/security/cve/CVE-2025-53633" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53633" }, { "cve": "CVE-2025-53634", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53634" } ], "notes": [ { "category": "general", "text": "Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. The HTTP Gateway processes headers, but with no timeout set. With a slow loris attack, an attacker could cause Denial of Service (DoS). Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 1385bd8 and shipped in v0.1.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53634", "url": "https://www.suse.com/security/cve/CVE-2025-53634" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53634" }, { "cve": "CVE-2025-53826", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53826" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename, and edit files. In version 2.39.0, File Browser\u0027s authentication system issues long-lived JWT tokens that remain valid even after the user logs out. As of time of publication, no known patches exist.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53826", "url": "https://www.suse.com/security/cve/CVE-2025-53826" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53826" }, { "cve": "CVE-2025-53893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53893" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename, and edit files. In version 2.38.0, a Denial of Service (DoS) vulnerability exists in the file processing logic when reading a file on endpoint `Filebrowser-Server-IP:PORT/files/{file-name}` . While the server correctly handles and stores uploaded files, it attempts to load the entire content into memory during read operations without size checks or resource limits. This allows an authenticated user to upload a large file and trigger uncontrolled memory consumption on read, potentially crashing the server and making it unresponsive. As of time of publication, no known patches are available.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53893", "url": "https://www.suse.com/security/cve/CVE-2025-53893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53893" }, { "cve": "CVE-2025-53945", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53945" } ], "notes": [ { "category": "general", "text": "apko allows users to build and publish OCI container images built from apk packages. Starting in version 0.27.0 and prior to version 0.29.5, critical files were inadvertently set to 0666, which could likely be abused for root escalation. Version 0.29.5 contains a fix for the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53945", "url": "https://www.suse.com/security/cve/CVE-2025-53945" }, { "category": "external", "summary": "SUSE Bug 1246746 for CVE-2025-53945", "url": "https://bugzilla.suse.com/1246746" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53945" }, { "cve": "CVE-2025-54059", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-54059" } ], "notes": [ { "category": "general", "text": "melange allows users to build apk packages using declarative pipelines. Starting in version 0.23.0 and prior to version 0.29.5, SBOM files generated by melange in apks had file system permissions mode 666. This potentially allows an unprivileged user to tamper with apk SBOMs on a running image, potentially confusing security scanners. An attacker could also perform a DoS under special circumstances. Version 0.29.5 fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-54059", "url": "https://www.suse.com/security/cve/CVE-2025-54059" }, { "category": "external", "summary": "SUSE Bug 1246745 for CVE-2025-54059", "url": "https://bugzilla.suse.com/1246745" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-54059" }, { "cve": "CVE-2025-54379", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-54379" } ], "notes": [ { "category": "general", "text": "LF Edge eKuiper is a lightweight IoT data analytics and stream processing engine running on resource-constraint edge devices. In versions before 2.2.1, there is a critical SQL Injection vulnerability in the getLast API functionality of the eKuiper project. This flaw allows unauthenticated remote attackers to execute arbitrary SQL statements on the underlying SQLite database by manipulating the table name input in an API request. Exploitation can lead to data theft, corruption, or deletion, and full database compromise. This is fixed in version 2.2.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-54379", "url": "https://www.suse.com/security/cve/CVE-2025-54379" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "not set" } ], "title": "CVE-2025-54379" }, { "cve": "CVE-2025-5689", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-5689" } ], "notes": [ { "category": "general", "text": "A flaw was found in the temporary user record that authd uses in the pre-auth NSS. As a result, a user login for the first time will be considered to be part of the root group in the context of that SSH session.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-5689", "url": "https://www.suse.com/security/cve/CVE-2025-5689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-5689" }, { "cve": "CVE-2025-5981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-5981" } ], "notes": [ { "category": "general", "text": "Arbitrary file write as the OSV-SCALIBR user on the host system via a path traversal vulnerability when using OSV-SCALIBR\u0027s unpack() function for container images. Particularly, when using the CLI flag --remote-image on untrusted container images.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-5981", "url": "https://www.suse.com/security/cve/CVE-2025-5981" }, { "category": "external", "summary": "SUSE Bug 1244726 for CVE-2025-5981", "url": "https://bugzilla.suse.com/1244726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-5981" }, { "cve": "CVE-2025-6023", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6023" } ], "notes": [ { "category": "general", "text": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6023", "url": "https://www.suse.com/security/cve/CVE-2025-6023" }, { "category": "external", "summary": "SUSE Bug 1246735 for CVE-2025-6023", "url": "https://bugzilla.suse.com/1246735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6023" }, { "cve": "CVE-2025-6032", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6032" } ], "notes": [ { "category": "general", "text": "A flaw was found in Podman. The podman machine init command fails to verify the TLS certificate when downloading the VM images from an OCI registry. This issue results in a Man In The Middle attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6032", "url": "https://www.suse.com/security/cve/CVE-2025-6032" }, { "category": "external", "summary": "SUSE Bug 1245320 for CVE-2025-6032", "url": "https://bugzilla.suse.com/1245320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6032" }, { "cve": "CVE-2025-6224", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6224" } ], "notes": [ { "category": "general", "text": "Certificate generation in juju/utils using the cert.NewLeaf function could include private information. If this certificate were then transferred over the network in plaintext, an attacker listening on that network could sniff the certificate and trivially extract the private key from it.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6224", "url": "https://www.suse.com/security/cve/CVE-2025-6224" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-6224" }, { "cve": "CVE-2025-6226", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6226" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.6, 10.8.x \u003c= 10.8.1, 10.7.x \u003c= 10.7.3, 9.11.x \u003c= 9.11.16 fail to verify authorization when retrieving cached posts by PendingPostID which allows an authenticated user to read posts in private channels they don\u0027t have access to via guessing the PendingPostID of recently created posts.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6226", "url": "https://www.suse.com/security/cve/CVE-2025-6226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-6226" }, { "cve": "CVE-2025-6227", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6227" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.7, 9.11.x \u003c= 9.11.16 fail to negotiate a new token when accepting the invite which allows a user that intercepts both invite and password to send synchronization payloads to the server that originally created the invite via the REST API.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6227", "url": "https://www.suse.com/security/cve/CVE-2025-6227" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "low" } ], "title": "CVE-2025-6227" }, { "cve": "CVE-2025-6233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6233" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.8.x \u003c= 10.8.1, 10.7.x \u003c= 10.7.3, 10.5.x \u003c= 10.5.7, 9.11.x \u003c= 9.11.16 fail to sanitize input paths of file attachments in the bulk import JSONL file, which allows a system admin to read arbitrary system files via path traversal.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6233", "url": "https://www.suse.com/security/cve/CVE-2025-6233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-6233" }, { "cve": "CVE-2025-6264", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6264" } ], "notes": [ { "category": "general", "text": "Velociraptor allows collection of VQL queries packaged into Artifacts from endpoints. These artifacts can be used to do anything and usually run with elevated permissions. To limit access to some dangerous artifact, Velociraptor allows for those to require high permissions like EXECVE to launch.\n\nThe Admin.Client.UpdateClientConfig is an artifact used to update the client\u0027s configuration. This artifact did not enforce an additional required permission, allowing users with COLLECT_CLIENT permissions (normally given by the \"Investigator\" role) to collect it from endpoints and update the configuration. \n\nThis can lead to arbitrary command execution and endpoint takeover.\n\nTo successfully exploit this vulnerability the user must already have access to collect artifacts from the endpoint (i.e. have the COLLECT_CLIENT given typically by the \"Investigator\u0027 role).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6264", "url": "https://www.suse.com/security/cve/CVE-2025-6264" }, { "category": "external", "summary": "SUSE Bug 1245123 for CVE-2025-6264", "url": "https://bugzilla.suse.com/1245123" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-6264" }, { "cve": "CVE-2025-6624", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6624" } ], "notes": [ { "category": "general", "text": "Versions of the package snyk before 1.1297.3 are vulnerable to Insertion of Sensitive Information into Log File through local Snyk CLI debug logs. Container Registry credentials provided via environment variables or command line arguments can be exposed when executing Snyk CLI in DEBUG or DEBUG/TRACE mode.\r\rThe issue affects the following Snyk commands:\r\r1. When snyk container test or snyk container monitor commands are run against a container registry, with debug mode enabled, the container registry credentials may be written into the local Snyk CLI debug log. This only happens with credentials specified in environment variables (SNYK_REGISTRY_USERNAME and SNYK_REGISTRY_PASSWORD), or in the CLI (--password/-p and --username/-u).\r\r2. When snyk auth command is executed with debug mode enabled AND the log level is set to TRACE, the Snyk access / refresh credential tokens used to connect the CLI to Snyk may be written into the local CLI debug logs.\r\r3. When snyk iac test is executed with a Remote IAC Custom rules bundle, debug mode enabled, AND the log level is set to TRACE, the docker registry token may be written into the local CLI debug logs.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6624", "url": "https://www.suse.com/security/cve/CVE-2025-6624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6624" } ] }
opensuse-su-2025:15254-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "openbao-2.3.1-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the openbao-2.3.1-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15254", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15254-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4656 page", "url": "https://www.suse.com/security/cve/CVE-2025-4656/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52893 page", "url": "https://www.suse.com/security/cve/CVE-2025-52893/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52894 page", "url": "https://www.suse.com/security/cve/CVE-2025-52894/" } ], "title": "openbao-2.3.1-1.1 on GA media", "tracking": { "current_release_date": "2025-07-03T00:00:00Z", "generator": { "date": "2025-07-03T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15254-1", "initial_release_date": "2025-07-03T00:00:00Z", "revision_history": [ { "date": "2025-07-03T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openbao-2.3.1-1.1.aarch64", "product": { "name": "openbao-2.3.1-1.1.aarch64", "product_id": "openbao-2.3.1-1.1.aarch64" } }, { "category": "product_version", "name": "openbao-agent-2.3.1-1.1.aarch64", "product": { "name": "openbao-agent-2.3.1-1.1.aarch64", "product_id": "openbao-agent-2.3.1-1.1.aarch64" } }, { "category": "product_version", "name": "openbao-cassandra-database-plugin-2.3.1-1.1.aarch64", "product": { "name": "openbao-cassandra-database-plugin-2.3.1-1.1.aarch64", "product_id": "openbao-cassandra-database-plugin-2.3.1-1.1.aarch64" } }, { "category": "product_version", "name": "openbao-influxdb-database-plugin-2.3.1-1.1.aarch64", "product": { "name": "openbao-influxdb-database-plugin-2.3.1-1.1.aarch64", "product_id": "openbao-influxdb-database-plugin-2.3.1-1.1.aarch64" } }, { "category": "product_version", "name": "openbao-mysql-database-plugin-2.3.1-1.1.aarch64", "product": { "name": "openbao-mysql-database-plugin-2.3.1-1.1.aarch64", "product_id": "openbao-mysql-database-plugin-2.3.1-1.1.aarch64" } }, { "category": "product_version", "name": "openbao-mysql-legacy-database-plugin-2.3.1-1.1.aarch64", "product": { "name": "openbao-mysql-legacy-database-plugin-2.3.1-1.1.aarch64", "product_id": "openbao-mysql-legacy-database-plugin-2.3.1-1.1.aarch64" } }, { "category": "product_version", "name": "openbao-postgresql-database-plugin-2.3.1-1.1.aarch64", "product": { "name": "openbao-postgresql-database-plugin-2.3.1-1.1.aarch64", "product_id": "openbao-postgresql-database-plugin-2.3.1-1.1.aarch64" } }, { "category": "product_version", "name": "openbao-server-2.3.1-1.1.aarch64", "product": { "name": "openbao-server-2.3.1-1.1.aarch64", "product_id": "openbao-server-2.3.1-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openbao-2.3.1-1.1.ppc64le", "product": { "name": "openbao-2.3.1-1.1.ppc64le", "product_id": "openbao-2.3.1-1.1.ppc64le" } }, { "category": "product_version", "name": "openbao-agent-2.3.1-1.1.ppc64le", "product": { "name": "openbao-agent-2.3.1-1.1.ppc64le", "product_id": "openbao-agent-2.3.1-1.1.ppc64le" } }, { "category": "product_version", "name": "openbao-cassandra-database-plugin-2.3.1-1.1.ppc64le", "product": { "name": "openbao-cassandra-database-plugin-2.3.1-1.1.ppc64le", "product_id": "openbao-cassandra-database-plugin-2.3.1-1.1.ppc64le" } }, { "category": "product_version", "name": "openbao-influxdb-database-plugin-2.3.1-1.1.ppc64le", "product": { "name": "openbao-influxdb-database-plugin-2.3.1-1.1.ppc64le", "product_id": "openbao-influxdb-database-plugin-2.3.1-1.1.ppc64le" } }, { "category": "product_version", "name": "openbao-mysql-database-plugin-2.3.1-1.1.ppc64le", "product": { "name": "openbao-mysql-database-plugin-2.3.1-1.1.ppc64le", "product_id": "openbao-mysql-database-plugin-2.3.1-1.1.ppc64le" } }, { "category": "product_version", "name": "openbao-mysql-legacy-database-plugin-2.3.1-1.1.ppc64le", "product": { "name": "openbao-mysql-legacy-database-plugin-2.3.1-1.1.ppc64le", "product_id": "openbao-mysql-legacy-database-plugin-2.3.1-1.1.ppc64le" } }, { "category": "product_version", "name": "openbao-postgresql-database-plugin-2.3.1-1.1.ppc64le", "product": { "name": "openbao-postgresql-database-plugin-2.3.1-1.1.ppc64le", "product_id": "openbao-postgresql-database-plugin-2.3.1-1.1.ppc64le" } }, { "category": "product_version", "name": "openbao-server-2.3.1-1.1.ppc64le", "product": { "name": "openbao-server-2.3.1-1.1.ppc64le", "product_id": "openbao-server-2.3.1-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openbao-2.3.1-1.1.s390x", "product": { "name": "openbao-2.3.1-1.1.s390x", "product_id": "openbao-2.3.1-1.1.s390x" } }, { "category": "product_version", "name": "openbao-agent-2.3.1-1.1.s390x", "product": { "name": "openbao-agent-2.3.1-1.1.s390x", "product_id": "openbao-agent-2.3.1-1.1.s390x" } }, { "category": "product_version", "name": "openbao-cassandra-database-plugin-2.3.1-1.1.s390x", "product": { "name": "openbao-cassandra-database-plugin-2.3.1-1.1.s390x", "product_id": "openbao-cassandra-database-plugin-2.3.1-1.1.s390x" } }, { "category": "product_version", "name": "openbao-influxdb-database-plugin-2.3.1-1.1.s390x", "product": { "name": "openbao-influxdb-database-plugin-2.3.1-1.1.s390x", "product_id": "openbao-influxdb-database-plugin-2.3.1-1.1.s390x" } }, { "category": "product_version", "name": "openbao-mysql-database-plugin-2.3.1-1.1.s390x", "product": { "name": "openbao-mysql-database-plugin-2.3.1-1.1.s390x", "product_id": "openbao-mysql-database-plugin-2.3.1-1.1.s390x" } }, { "category": "product_version", "name": "openbao-mysql-legacy-database-plugin-2.3.1-1.1.s390x", "product": { "name": "openbao-mysql-legacy-database-plugin-2.3.1-1.1.s390x", "product_id": "openbao-mysql-legacy-database-plugin-2.3.1-1.1.s390x" } }, { "category": "product_version", "name": "openbao-postgresql-database-plugin-2.3.1-1.1.s390x", "product": { "name": "openbao-postgresql-database-plugin-2.3.1-1.1.s390x", "product_id": "openbao-postgresql-database-plugin-2.3.1-1.1.s390x" } }, { "category": "product_version", "name": "openbao-server-2.3.1-1.1.s390x", "product": { "name": "openbao-server-2.3.1-1.1.s390x", "product_id": "openbao-server-2.3.1-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openbao-2.3.1-1.1.x86_64", "product": { "name": "openbao-2.3.1-1.1.x86_64", "product_id": "openbao-2.3.1-1.1.x86_64" } }, { "category": "product_version", "name": "openbao-agent-2.3.1-1.1.x86_64", "product": { "name": "openbao-agent-2.3.1-1.1.x86_64", "product_id": "openbao-agent-2.3.1-1.1.x86_64" } }, { "category": "product_version", "name": "openbao-cassandra-database-plugin-2.3.1-1.1.x86_64", "product": { "name": "openbao-cassandra-database-plugin-2.3.1-1.1.x86_64", "product_id": "openbao-cassandra-database-plugin-2.3.1-1.1.x86_64" } }, { "category": "product_version", "name": "openbao-influxdb-database-plugin-2.3.1-1.1.x86_64", "product": { "name": "openbao-influxdb-database-plugin-2.3.1-1.1.x86_64", "product_id": "openbao-influxdb-database-plugin-2.3.1-1.1.x86_64" } }, { "category": "product_version", "name": "openbao-mysql-database-plugin-2.3.1-1.1.x86_64", "product": { "name": "openbao-mysql-database-plugin-2.3.1-1.1.x86_64", "product_id": "openbao-mysql-database-plugin-2.3.1-1.1.x86_64" } }, { "category": "product_version", "name": "openbao-mysql-legacy-database-plugin-2.3.1-1.1.x86_64", "product": { "name": "openbao-mysql-legacy-database-plugin-2.3.1-1.1.x86_64", "product_id": "openbao-mysql-legacy-database-plugin-2.3.1-1.1.x86_64" } }, { "category": "product_version", "name": "openbao-postgresql-database-plugin-2.3.1-1.1.x86_64", "product": { "name": "openbao-postgresql-database-plugin-2.3.1-1.1.x86_64", "product_id": "openbao-postgresql-database-plugin-2.3.1-1.1.x86_64" } }, { "category": "product_version", "name": "openbao-server-2.3.1-1.1.x86_64", "product": { "name": "openbao-server-2.3.1-1.1.x86_64", "product_id": "openbao-server-2.3.1-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openbao-2.3.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-2.3.1-1.1.aarch64" }, "product_reference": "openbao-2.3.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-2.3.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-2.3.1-1.1.ppc64le" }, "product_reference": "openbao-2.3.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-2.3.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-2.3.1-1.1.s390x" }, "product_reference": "openbao-2.3.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-2.3.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-2.3.1-1.1.x86_64" }, "product_reference": "openbao-2.3.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-agent-2.3.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.aarch64" }, "product_reference": "openbao-agent-2.3.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-agent-2.3.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.ppc64le" }, "product_reference": "openbao-agent-2.3.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-agent-2.3.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.s390x" }, "product_reference": "openbao-agent-2.3.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-agent-2.3.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.x86_64" }, "product_reference": "openbao-agent-2.3.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-cassandra-database-plugin-2.3.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.aarch64" }, "product_reference": "openbao-cassandra-database-plugin-2.3.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-cassandra-database-plugin-2.3.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.ppc64le" }, "product_reference": "openbao-cassandra-database-plugin-2.3.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-cassandra-database-plugin-2.3.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.s390x" }, "product_reference": "openbao-cassandra-database-plugin-2.3.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-cassandra-database-plugin-2.3.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.x86_64" }, "product_reference": "openbao-cassandra-database-plugin-2.3.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-influxdb-database-plugin-2.3.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.aarch64" }, "product_reference": "openbao-influxdb-database-plugin-2.3.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-influxdb-database-plugin-2.3.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.ppc64le" }, "product_reference": "openbao-influxdb-database-plugin-2.3.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-influxdb-database-plugin-2.3.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.s390x" }, "product_reference": "openbao-influxdb-database-plugin-2.3.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-influxdb-database-plugin-2.3.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.x86_64" }, "product_reference": "openbao-influxdb-database-plugin-2.3.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-mysql-database-plugin-2.3.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.aarch64" }, "product_reference": "openbao-mysql-database-plugin-2.3.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-mysql-database-plugin-2.3.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.ppc64le" }, "product_reference": "openbao-mysql-database-plugin-2.3.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-mysql-database-plugin-2.3.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.s390x" }, "product_reference": "openbao-mysql-database-plugin-2.3.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-mysql-database-plugin-2.3.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.x86_64" }, "product_reference": "openbao-mysql-database-plugin-2.3.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-mysql-legacy-database-plugin-2.3.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.aarch64" }, "product_reference": "openbao-mysql-legacy-database-plugin-2.3.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-mysql-legacy-database-plugin-2.3.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.ppc64le" }, "product_reference": "openbao-mysql-legacy-database-plugin-2.3.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-mysql-legacy-database-plugin-2.3.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.s390x" }, "product_reference": "openbao-mysql-legacy-database-plugin-2.3.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-mysql-legacy-database-plugin-2.3.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.x86_64" }, "product_reference": "openbao-mysql-legacy-database-plugin-2.3.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-postgresql-database-plugin-2.3.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.aarch64" }, "product_reference": "openbao-postgresql-database-plugin-2.3.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-postgresql-database-plugin-2.3.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.ppc64le" }, "product_reference": "openbao-postgresql-database-plugin-2.3.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-postgresql-database-plugin-2.3.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.s390x" }, "product_reference": "openbao-postgresql-database-plugin-2.3.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-postgresql-database-plugin-2.3.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.x86_64" }, "product_reference": "openbao-postgresql-database-plugin-2.3.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-server-2.3.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.aarch64" }, "product_reference": "openbao-server-2.3.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-server-2.3.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.ppc64le" }, "product_reference": "openbao-server-2.3.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-server-2.3.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.s390x" }, "product_reference": "openbao-server-2.3.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openbao-server-2.3.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.x86_64" }, "product_reference": "openbao-server-2.3.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4656" } ], "notes": [ { "category": "general", "text": "Vault Community and Vault Enterprise rekey and recovery key operations can lead to a denial of service due to uncontrolled cancellation by a Vault operator. This vulnerability (CVE-2025-4656) has been remediated in Vault Community Edition 1.20.0 and Vault Enterprise 1.20.0, 1.19.6, 1.18.11, 1.17.17, and 1.16.22.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openbao-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4656", "url": "https://www.suse.com/security/cve/CVE-2025-4656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openbao-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-03T00:00:00Z", "details": "low" } ], "title": "CVE-2025-4656" }, { "cve": "CVE-2025-52893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52893" } ], "notes": [ { "category": "general", "text": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 may leak sensitive information in logs when processing malformed data. This is separate from the earlier HCSEC-2025-09 / CVE-2025-4166. This issue has been fixed in OpenBao v2.3.0 and later. Like with HCSEC-2025-09, there is no known workaround except to ensure properly formatted requests from all clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openbao-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52893", "url": "https://www.suse.com/security/cve/CVE-2025-52893" }, { "category": "external", "summary": "SUSE Bug 1245381 for CVE-2025-52893", "url": "https://bugzilla.suse.com/1245381" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openbao-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-03T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52893" }, { "cve": "CVE-2025-52894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52894" } ], "notes": [ { "category": "general", "text": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 allowed an attacker to perform unauthenticated, unaudited cancellation of root rekey and recovery rekey operations, effecting a denial of service. In OpenBao v2.2.0 and later, manually setting the configuration option `disable_unauthed_rekey_endpoints=true` allows an operator to deny these rarely-used endpoints on global listeners. A patch is available at commit fe75468822a22a88318c6079425357a02ae5b77b. In a future OpenBao release communicated on OpenBao\u0027s website, the maintainers will set this to `true` for all users and provide an authenticated alternative. As a workaround, if an active proxy or load balancer sits in front of OpenBao, an operator can deny requests to these endpoints from unauthorized IP ranges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:openbao-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52894", "url": "https://www.suse.com/security/cve/CVE-2025-52894" }, { "category": "external", "summary": "SUSE Bug 1245389 for CVE-2025-52894", "url": "https://bugzilla.suse.com/1245389" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:openbao-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:openbao-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-agent-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1.x86_64", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.aarch64", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.ppc64le", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.s390x", "openSUSE Tumbleweed:openbao-server-2.3.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-03T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52894" } ] }
ghsa-prpj-rchp-9j5h
Vulnerability from github
Impact
OpenBao and HashiCorp Vault allowed an attacker to perform unauthenticated, unaudited cancellation of root rekey and recovery rekey operations, effecting a denial of service.
Patches
In OpenBao v2.2.2 and later, manually setting the configuration option disable_unauthed_rekey_endpoints=true
allows an operator to deny these rarely-used endpoints on global listeners.
In a future OpenBao release communicated on our website, we will set this to true
for all users and provide an authenticated alternative.
This vulnerability has been disclosed to HashiCorp; see their website for more information.
Workarounds
If an active proxy or load balancer sits in front of OpenBao, an operator can deny requests to these endpoints from unauthorized IP ranges.
References
See the deprecation notice.
{ "affected": [ { "database_specific": { "last_known_affected_version_range": "\u003c 2.3.1" }, "package": { "ecosystem": "Go", "name": "github.com/openbao/openbao" }, "ranges": [ { "events": [ { "introduced": "0.1.0" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/openbao/openbao" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20250625150133-fe75468822a2" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-52894" ], "database_specific": { "cwe_ids": [ "CWE-20", "CWE-306" ], "github_reviewed": true, "github_reviewed_at": "2025-06-26T21:29:05Z", "nvd_published_at": "2025-06-25T17:15:39Z", "severity": "MODERATE" }, "details": "### Impact\n\nOpenBao and HashiCorp Vault allowed an attacker to perform unauthenticated, unaudited cancellation of root rekey and recovery rekey operations, effecting a denial of service.\n\n### Patches\n\nIn OpenBao v2.2.2 and later, manually setting the configuration option `disable_unauthed_rekey_endpoints=true` allows an operator to deny these rarely-used endpoints on global listeners.\n\nIn a future OpenBao release [communicated on our website](https://openbao.org/docs/deprecation/), we will set this to `true` for all users and provide an authenticated alternative.\n\nThis vulnerability has been disclosed to HashiCorp; see their website for more information. \n\n### Workarounds\n\nIf an active proxy or load balancer sits in front of OpenBao, an operator can deny requests to these endpoints from unauthorized IP ranges.\n\n### References\n\nSee the [deprecation notice](https://openbao.org/docs/deprecation/unauthed-rekey/).", "id": "GHSA-prpj-rchp-9j5h", "modified": "2025-08-12T20:30:31Z", "published": "2025-06-26T21:29:05Z", "references": [ { "type": "WEB", "url": "https://github.com/openbao/openbao/security/advisories/GHSA-prpj-rchp-9j5h" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52894" }, { "type": "WEB", "url": "https://github.com/openbao/openbao/commit/fe75468822a22a88318c6079425357a02ae5b77b" }, { "type": "PACKAGE", "url": "https://github.com/openbao/openbao" }, { "type": "WEB", "url": "https://github.com/openbao/openbao/releases/tag/v2.3.1" }, { "type": "WEB", "url": "https://openbao.org/docs/deprecation" }, { "type": "WEB", "url": "https://openbao.org/docs/deprecation/unauthed-rekey" }, { "type": "WEB", "url": "https://pkg.go.dev/vuln/GO-2025-3783" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "OpenBao allows cancellation of root rekey and recovery rekey operations without authentication" }
fkie_cve-2025-52894
Vulnerability from fkie_nvd
▶ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/openbao/openbao/commit/fe75468822a22a88318c6079425357a02ae5b77b | Patch | |
security-advisories@github.com | https://github.com/openbao/openbao/security/advisories/GHSA-prpj-rchp-9j5h | Vendor Advisory | |
security-advisories@github.com | https://openbao.org/docs/deprecation | Product | |
security-advisories@github.com | https://openbao.org/docs/deprecation/unauthed-rekey | Product |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:*", "matchCriteriaId": "C70EF0AA-975A-4F83-9344-CBEA54F8601B", "versionEndExcluding": "2.3.0", "versionStartIncluding": "2.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 allowed an attacker to perform unauthenticated, unaudited cancellation of root rekey and recovery rekey operations, effecting a denial of service. In OpenBao v2.2.0 and later, manually setting the configuration option `disable_unauthed_rekey_endpoints=true` allows an operator to deny these rarely-used endpoints on global listeners. A patch is available at commit fe75468822a22a88318c6079425357a02ae5b77b. In a future OpenBao release communicated on OpenBao\u0027s website, the maintainers will set this to `true` for all users and provide an authenticated alternative. As a workaround, if an active proxy or load balancer sits in front of OpenBao, an operator can deny requests to these endpoints from unauthorized IP ranges." }, { "lang": "es", "value": "OpenBao existe para proporcionar una soluci\u00f3n de software que permite gestionar, almacenar y distribuir datos confidenciales, como secretos, certificados y claves. En versiones anteriores a la v2.3.0, OpenBao permit\u00eda a un atacante realizar cancelaciones no autenticadas ni auditadas de operaciones de regeneraci\u00f3n de claves de ra\u00edz y de recuperaci\u00f3n, lo que provocaba una denegaci\u00f3n de servicio. En OpenBao v2.2.0 y posteriores, la configuraci\u00f3n manual de la opci\u00f3n `disable_unauthed_rekey_endpoints=true` permite a un operador denegar el acceso a estos endpoints poco utilizados en escuchas globales. Hay un parche disponible en el commit fe75468822a22a88318c6079425357a02ae5b77b. En una futura versi\u00f3n de OpenBao, anunciada en su sitio web, los fabricantees la configurar\u00e1n como `true` para todos los usuarios y ofrecer\u00e1n una alternativa autenticada. Como soluci\u00f3n alternativa, si un proxy activo o un balanceador de carga se encuentra frente a OpenBao, un operador puede rechazar solicitudes a estos endpoints desde rangos de IP no autorizados." } ], "id": "CVE-2025-52894", "lastModified": "2025-08-12T20:51:16.360", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2025-06-25T17:15:39.677", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/openbao/openbao/commit/fe75468822a22a88318c6079425357a02ae5b77b" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/openbao/openbao/security/advisories/GHSA-prpj-rchp-9j5h" }, { "source": "security-advisories@github.com", "tags": [ "Product" ], "url": "https://openbao.org/docs/deprecation" }, { "source": "security-advisories@github.com", "tags": [ "Product" ], "url": "https://openbao.org/docs/deprecation/unauthed-rekey" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.