opensuse-su-2025:15159-1
Vulnerability from csaf_opensuse
Published
2025-05-26 00:00
Modified
2025-05-26 00:00
Summary
govulncheck-vulndb-0.0.20250523T151856-1.1 on GA media
Notes
Title of the patch
govulncheck-vulndb-0.0.20250523T151856-1.1 on GA media
Description of the patch
These are all security issues fixed in the govulncheck-vulndb-0.0.20250523T151856-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15159
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "govulncheck-vulndb-0.0.20250523T151856-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the govulncheck-vulndb-0.0.20250523T151856-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15159", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15159-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2025:15159-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBVOKYMJCE2HZLSF5W3H3Q7KEHMMOQR3/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2025:15159-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBVOKYMJCE2HZLSF5W3H3Q7KEHMMOQR3/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-40120 page", "url": "https://www.suse.com/security/cve/CVE-2024-40120/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-1975 page", "url": "https://www.suse.com/security/cve/CVE-2025-1975/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-2527 page", "url": "https://www.suse.com/security/cve/CVE-2025-2527/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-2570 page", "url": "https://www.suse.com/security/cve/CVE-2025-2570/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-31947 page", "url": "https://www.suse.com/security/cve/CVE-2025-31947/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-3446 page", "url": "https://www.suse.com/security/cve/CVE-2025-3446/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47282 page", "url": "https://www.suse.com/security/cve/CVE-2025-47282/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47283 page", "url": "https://www.suse.com/security/cve/CVE-2025-47283/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47284 page", "url": "https://www.suse.com/security/cve/CVE-2025-47284/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47290 page", "url": "https://www.suse.com/security/cve/CVE-2025-47290/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47291 page", "url": "https://www.suse.com/security/cve/CVE-2025-47291/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-48056 page", "url": "https://www.suse.com/security/cve/CVE-2025-48056/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-48069 page", "url": "https://www.suse.com/security/cve/CVE-2025-48069/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-5031 page", "url": "https://www.suse.com/security/cve/CVE-2025-5031/" } ], "title": "govulncheck-vulndb-0.0.20250523T151856-1.1 on GA media", "tracking": { "current_release_date": "2025-05-26T00:00:00Z", "generator": { "date": "2025-05-26T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15159-1", "initial_release_date": "2025-05-26T00:00:00Z", "revision_history": [ { "date": "2025-05-26T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "product": { "name": "govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "product_id": "govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "product": { "name": "govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "product_id": "govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "product": { "name": "govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "product_id": "govulncheck-vulndb-0.0.20250523T151856-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64", "product": { "name": "govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64", "product_id": "govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64" }, "product_reference": "govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le" }, "product_reference": "govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250523T151856-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x" }, "product_reference": "govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" }, "product_reference": "govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-40120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-40120" } ], "notes": [ { "category": "general", "text": "seaweedfs v3.68 was discovered to contain a SQL injection vulnerability via the component /abstract_sql/abstract_sql_store.go.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-40120", "url": "https://www.suse.com/security/cve/CVE-2024-40120" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-26T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-40120" }, { "cve": "CVE-2025-1975", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-1975" } ], "notes": [ { "category": "general", "text": "A vulnerability in the Ollama server version 0.5.11 allows a malicious user to cause a Denial of Service (DoS) attack by customizing the manifest content and spoofing a service. This is due to improper validation of array index access when downloading a model via the /api/pull endpoint, which can lead to a server crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-1975", "url": "https://www.suse.com/security/cve/CVE-2025-1975" }, { "category": "external", "summary": "SUSE Bug 1243287 for CVE-2025-1975", "url": "https://bugzilla.suse.com/1243287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-26T00:00:00Z", "details": "important" } ], "title": "CVE-2025-1975" }, { "cve": "CVE-2025-2527", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-2527" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.2, 9.11.x \u003c= 9.11.11 failed to properly verify a user\u0027s permissions when accessing groups, which allows an attacker to view group information via an API request.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-2527", "url": "https://www.suse.com/security/cve/CVE-2025-2527" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-26T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-2527" }, { "cve": "CVE-2025-2570", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-2570" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.3, 9.11.x \u003c= 9.11.11 fail to check `RestrictSystemAdmin` setting if user doesn\u0027t have access to `ExperimentalSettings` which allows a System Manager to access `ExperimentSettings` when `RestrictSystemAdmin` is true via System Console.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-2570", "url": "https://www.suse.com/security/cve/CVE-2025-2570" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-26T00:00:00Z", "details": "low" } ], "title": "CVE-2025-2570" }, { "cve": "CVE-2025-31947", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-31947" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.6.x \u003c= 10.6.1, 10.5.x \u003c= 10.5.2, 10.4.x \u003c= 10.4.4, 9.11.x \u003c= 9.11.11 fail to lockout LDAP users following repeated login failures, which allows attackers to lock external LDAP accounts through repeated login failures through Mattermost.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-31947", "url": "https://www.suse.com/security/cve/CVE-2025-31947" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-26T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-31947" }, { "cve": "CVE-2025-3446", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-3446" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.6.x \u003c= 10.6.1, 10.5.x \u003c= 10.5.2, 10.4.x \u003c= 10.4.4, 9.11.x \u003c= 9.11.11 fail to check the correct permissions which allows authenticated users who only have permission to invite non-guest users to a team to add guest users to that team via the API to add a single user to a team.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-3446", "url": "https://www.suse.com/security/cve/CVE-2025-3446" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-26T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-3446" }, { "cve": "CVE-2025-47282", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47282" } ], "notes": [ { "category": "general", "text": "Gardener External DNS Management is an environment to manage external DNS entries for a kubernetes cluster. A security vulnerability was discovered in Gardener\u0027s External DNS Management prior to version 0.23.6 that could allow a user with administrative privileges for a Gardener project or a user with administrative privileges for a shoot cluster, including administrative privileges for a single namespace of the shoot cluster, to obtain control over the seed cluster where the shoot cluster is managed. This CVE affects all Gardener installations no matter of the public cloud provider(s) used for the seed clusters/shoot clusters. The affected component is `gardener/external-dns-management`. The `external-dns-management` component may also be deployed on the seeds by the `gardener/gardener-extension-shoot-dns-service` extension when the extension is enabled. In this case, all versions of the `shoot-dns-service` extension `\u003c= v1.60.0` are affected by this vulnerability. Version 0.23.6 of Gardener External DNS Management fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47282", "url": "https://www.suse.com/security/cve/CVE-2025-47282" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-26T00:00:00Z", "details": "critical" } ], "title": "CVE-2025-47282" }, { "cve": "CVE-2025-47283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47283" } ], "notes": [ { "category": "general", "text": "Gardener implements the automated management and operation of Kubernetes clusters as a service. A security vulnerability was discovered in Gardener prior to versions 1.116.4, 1.117.5, 1.118.2, and 1.119.0 that could allow a user with administrative privileges for a Gardener project to obtain control over the seed cluster(s) where their shoot clusters are managed. This CVE affects all Gardener installations no matter of the public cloud provider(s) used for the seed clusters/shoot clusters. `gardener/gardener` (`gardenlet`) is the affected component. Versions 1.116.4, 1.117.5, 1.118.2, and 1.119.0 fix the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47283", "url": "https://www.suse.com/security/cve/CVE-2025-47283" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-26T00:00:00Z", "details": "critical" } ], "title": "CVE-2025-47283" }, { "cve": "CVE-2025-47284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47284" } ], "notes": [ { "category": "general", "text": "Gardener implements the automated management and operation of Kubernetes clusters as a service. A security vulnerability was discovered in the `gardenlet` component of Gardener prior to versions 1.116.4, 1.117.5, 1.118.2, and 1.119.0. It could allow a user with administrative privileges for a Gardener project to obtain control over the seed cluster(s) where their shoot clusters are managed. This CVE affects all Gardener installations where gardener/gardener-extension-provider-gcp is in use. Versions 1.116.4, 1.117.5, 1.118.2, and 1.119.0 fix the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47284", "url": "https://www.suse.com/security/cve/CVE-2025-47284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-26T00:00:00Z", "details": "critical" } ], "title": "CVE-2025-47284" }, { "cve": "CVE-2025-47290", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47290" } ], "notes": [ { "category": "general", "text": "containerd is a container runtime. A time-of-check to time-of-use (TOCTOU) vulnerability was found in containerd v2.1.0. While unpacking an image during an image pull, specially crafted container images could arbitrarily modify the host file system. The only affected version of containerd is 2.1.0. Other versions of containerd are not affected. This bug has been fixed in containerd 2.1.1. Users should update to this version to resolve the issue. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47290", "url": "https://www.suse.com/security/cve/CVE-2025-47290" }, { "category": "external", "summary": "SUSE Bug 1243392 for CVE-2025-47290", "url": "https://bugzilla.suse.com/1243392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-26T00:00:00Z", "details": "important" } ], "title": "CVE-2025-47290" }, { "cve": "CVE-2025-47291", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47291" } ], "notes": [ { "category": "general", "text": "containerd is an open-source container runtime. A bug was found in the containerd\u0027s CRI implementation where containerd, starting in version 2.0.1 and prior to version 2.0.5, doesn\u0027t put usernamespaced containers under the Kubernetes\u0027 cgroup hierarchy, therefore some Kubernetes limits are not honored. This may cause a denial of service of the Kubernetes node. This bug has been fixed in containerd 2.0.5+ and 2.1.0+. Users should update to these versions to resolve the issue. As a workaround, disable usernamespaced pods in Kubernetes temporarily.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47291", "url": "https://www.suse.com/security/cve/CVE-2025-47291" }, { "category": "external", "summary": "SUSE Bug 1243632 for CVE-2025-47291", "url": "https://bugzilla.suse.com/1243632" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-26T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-47291" }, { "cve": "CVE-2025-48056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-48056" } ], "notes": [ { "category": "general", "text": "Hubble is a fully distributed networking and security observability platform for cloud native workloads. Prior to version 1.17.2, a network attacker could inject malicious control characters into Hubble CLI terminal output, potentially leading to loss of integrity and manipulation of the output. This could be leveraged to conceal log entries, rewrite output, or even make the terminal temporarily unusable. Exploitation of this attack would require the victim to be monitoring Kafka traffic using Layer 7 Protocol Visibility at the time of the attack. The issue is patched in Hubble CLI v1.17.2. Hubble CLI users who are unable to upgrade can direct their Hubble flows to a log file and inspect the output within a text editor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-48056", "url": "https://www.suse.com/security/cve/CVE-2025-48056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-26T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-48056" }, { "cve": "CVE-2025-48069", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-48069" } ], "notes": [ { "category": "general", "text": "ejson2env allows users to decrypt EJSON secrets and export them as environment variables. Prior to version 2.0.8, the `ejson2env` tool has a vulnerability related to how it writes to `stdout`. Specifically, the tool is intended to write an export statement for environment variables and their values. However, due to inadequate output sanitization, there is a potential risk where variable names or values may include malicious content, resulting in additional unintended commands being output to `stdout`. If this output is improperly utilized in further command execution, it could lead to command injection, allowing an attacker to execute arbitrary commands on the host system. Version 2.0.8 sanitizes output during decryption. Other mitigations involve avoiding use of `ejson2env` to decrypt untrusted user secrets and/or avoiding evaluating or executing the direct output from `ejson2env` without removing nonprintable characters.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-48069", "url": "https://www.suse.com/security/cve/CVE-2025-48069" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-26T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-48069" }, { "cve": "CVE-2025-5031", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-5031" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Ackites KillWxapkg up to 2.4.1. It has been rated as problematic. This issue affects some unknown processing of the component wxapkg File Decompression Handler. The manipulation leads to resource consumption. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-5031", "url": "https://www.suse.com/security/cve/CVE-2025-5031" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250523T151856-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-26T00:00:00Z", "details": "low" } ], "title": "CVE-2025-5031" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…